{"id":1157,"date":"2023-11-09T21:28:49","date_gmt":"2023-11-09T13:28:49","guid":{"rendered":"https:\/\/www.ruianding.com\/blog\/?p=1157"},"modified":"2023-12-04T19:41:01","modified_gmt":"2023-12-04T11:41:01","slug":"popular-internet-portocols-transport-layer-security-tls","status":"publish","type":"post","link":"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/","title":{"rendered":"Internet Protocols \u2013 Transport Layer Security (TLS)"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">TLS Concepts<\/h3>\n\n\n\n<h5 class=\"wp-block-heading\">1. What is TLS and Why is it used?<\/h5>\n\n\n\n<p><strong>TLS (Transport Layer Security)<\/strong> is a protocol providing secure communication between clients and servers on the internet. TLS operates primarily at the <strong>Session Layer<\/strong> (Layer 5) and partially at the <strong>Presentation Layer<\/strong> (Layer 6). It ensures data privacy and integrity between two communicating applications.<\/p>\n\n\n\n<p>It&#8217;s used for <strong>encrypting<\/strong> data transmitted over the internet, like web browsing, email, messaging, and voice-over IP (VoIP).<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">2. History of TLS and SSL (Secure Sockets Layer)<\/h5>\n\n\n\n<p><strong>SSL<\/strong> was the predecessor to TLS, developed by Netscape in the 1990s for securing transactions on the web.<\/p>\n\n\n\n<p><strong>TLS<\/strong> evolved from SSL and was standardized by the <a href=\"https:\/\/www.ietf.org\/about\/introduction\/\" data-type=\"URL\" data-id=\"https:\/\/www.ietf.org\/about\/introduction\/\" target=\"_blank\" rel=\"noreferrer noopener\">IETF<\/a>. It addressed various security flaws and limitations in SSL.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">3. Cryptography in TLS<\/h5>\n\n\n\n<p><strong>Symmetric Encryption<\/strong>: Where the <strong>same key<\/strong> is used for both encryption and decryption (e.g., AES).<\/p>\n\n\n\n<p><strong>Asymmetric Encryption<\/strong>: Involves <strong>public<\/strong> and <strong>private keys<\/strong> (e.g., RSA, ECC). Public keys encrypt data that can only be decrypted by the corresponding private key.<\/p>\n\n\n\n<p><strong>Certificates and Keys<\/strong>: Digital certificates (often X.509) are used to verify the ownership of a public key.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">TLS Handshake<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1098\" height=\"545\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/11\/image-19.png\" alt=\"\" class=\"wp-image-1194\"\/><\/figure>\n\n\n\n<p><strong>1. Client Hello:<\/strong> The client initiates the handshake by sending a <code>ClientHello<\/code> message.<\/p>\n\n\n\n<p>This message includes the <strong>TLS version<\/strong> the client supports, a list of supported <strong>cipher suites<\/strong> (combinations of cryptographic algorithms), a list of supported compression methods, and a random byte string used in later steps.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1329\" height=\"904\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/11\/image-13.png\" alt=\"\" class=\"wp-image-1186\"\/><\/figure>\n\n\n\n<p><strong>2.1 Server Hello<\/strong>: The server responds with a <code>ServerHello<\/code> message.<\/p>\n\n\n\n<p>It chooses the TLS version and cipher suite from the options provided in the <code>ClientHello<\/code>. The server also generates its own random byte string.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1336\" height=\"906\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/11\/image-14.png\" alt=\"\" class=\"wp-image-1187\"\/><\/figure>\n\n\n\n<p><strong>2.2 Certificate<\/strong>: The server sends its digital certificate to the client in a <code>Certificate<\/code> message.<\/p>\n\n\n\n<p>The certificate usually includes the server&#8217;s <strong>public key<\/strong> and is issued by a <strong>trusted Certificate Authority (CA)<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1331\" height=\"916\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/11\/image-15.png\" alt=\"\" class=\"wp-image-1188\"\/><\/figure>\n\n\n\n<p><strong>2.3 Server Hello Done<\/strong>: The server sends a <code>ServerHelloDone<\/code> message, indicating it has finished sending its part of the negotiation.<\/p>\n\n\n\n<p><strong>3. Client Key Exchange<\/strong>: The client sends a <code>ClientKeyExchange<\/code> message.<\/p>\n\n\n\n<p>It usually contains the pre-master secret encrypted with the server&#8217;s public key.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1271\" height=\"773\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/11\/image-16.png\" alt=\"\" class=\"wp-image-1189\"\/><\/figure>\n\n\n\n<p><strong>4. Cipher Change Spec<\/strong>: Both client and server send a <code>CipherChangeSpec<\/code> message, signaling that subsequent messages will be encrypted using the keys derived from the pre-master secret.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1264\" height=\"729\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/11\/image-18.png\" alt=\"\" class=\"wp-image-1191\"\/><\/figure>\n\n\n\n<p><strong>5. Finished<\/strong>: Finally, both client and server exchange <code>Finished<\/code> messages, verifying that the key exchange and authentication processes were successful.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-default\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><\/h3>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>TLS Concepts 1. What is TLS and Why is it used? TLS (Transport Layer Security) is a protocol providing secure communication between clients and servers on the internet. TLS operates primarily at the Session Layer (Layer 5) and partially at the Presentation Layer (Layer 6). It ensures data privacy and integrity between two communicating applications. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[49],"tags":[44],"class_list":["post-1157","post","type-post","status-publish","format-standard","hentry","category-protocols","tag-network"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Internet Protocols \u2013 Transport Layer Security (TLS) - \u6781\u7b80IT\uff5cSimpleIT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Internet Protocols \u2013 Transport Layer Security (TLS) - \u6781\u7b80IT\uff5cSimpleIT\" \/>\n<meta property=\"og:description\" content=\"TLS Concepts 1. What is TLS and Why is it used? TLS (Transport Layer Security) is a protocol providing secure communication between clients and servers on the internet. TLS operates primarily at the Session Layer (Layer 5) and partially at the Presentation Layer (Layer 6). It ensures data privacy and integrity between two communicating applications. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/\" \/>\n<meta property=\"og:site_name\" content=\"\u6781\u7b80IT\uff5cSimpleIT\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-09T13:28:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-04T11:41:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/11\/image-19.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1098\" \/>\n\t<meta property=\"og:image:height\" content=\"545\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ruian Ding\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ruian Ding\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/\"},\"author\":{\"name\":\"Ruian Ding\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b\"},\"headline\":\"Internet Protocols \u2013 Transport Layer Security (TLS)\",\"datePublished\":\"2023-11-09T13:28:49+00:00\",\"dateModified\":\"2023-12-04T11:41:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/\"},\"wordCount\":374,\"publisher\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b\"},\"image\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/11\/image-19.png\",\"keywords\":[\"NETWORK\"],\"articleSection\":[\"Protocols\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/\",\"url\":\"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/\",\"name\":\"Internet Protocols \u2013 Transport Layer Security (TLS) - \u6781\u7b80IT\uff5cSimpleIT\",\"isPartOf\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/11\/image-19.png\",\"datePublished\":\"2023-11-09T13:28:49+00:00\",\"dateModified\":\"2023-12-04T11:41:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/#primaryimage\",\"url\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/11\/image-19.png\",\"contentUrl\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/11\/image-19.png\",\"width\":1098,\"height\":545},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ruianding.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Protocols \u2013 Transport Layer Security (TLS)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/#website\",\"url\":\"https:\/\/www.ruianding.com\/blog\/\",\"name\":\"Ruian's Tech Troubleshooting Toolbox\",\"description\":\"Debug the World.\",\"publisher\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b\"},\"alternateName\":\"\u4e01\u777f\u5b89\u7684\u6280\u672f\u5206\u4eab\u535a\u5ba2\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ruianding.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b\",\"name\":\"Ruian Ding\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/05\/logo.png\",\"contentUrl\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/05\/logo.png\",\"width\":284,\"height\":284,\"caption\":\"Ruian Ding\"},\"logo\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/image\/\"},\"description\":\"I am currently a Support Specialist at NIO, focusing on cloud-related issues for NIO Power. Previously, at Microsoft Entra ID, I specialized in identity and access management (IAM), including device registration, Windows Hello for Business (WHfB), multi-factor authentication (MFA), and single sign-on (SSO). In addition to my core expertise, I have a strong foundation in Active Directory, Servers, Cloud Computing, Network Administration, and Front-end Web Development. This diverse technical skill set enables me to effectively handle a wide range of challenges in a fast-paced IT environment.\",\"sameAs\":[\"https:\/\/www.ruianding.com\"],\"url\":\"https:\/\/www.ruianding.com\/blog\/author\/ruiand\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Internet Protocols \u2013 Transport Layer Security (TLS) - \u6781\u7b80IT\uff5cSimpleIT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/","og_locale":"en_US","og_type":"article","og_title":"Internet Protocols \u2013 Transport Layer Security (TLS) - \u6781\u7b80IT\uff5cSimpleIT","og_description":"TLS Concepts 1. What is TLS and Why is it used? TLS (Transport Layer Security) is a protocol providing secure communication between clients and servers on the internet. TLS operates primarily at the Session Layer (Layer 5) and partially at the Presentation Layer (Layer 6). It ensures data privacy and integrity between two communicating applications. [&hellip;]","og_url":"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/","og_site_name":"\u6781\u7b80IT\uff5cSimpleIT","article_published_time":"2023-11-09T13:28:49+00:00","article_modified_time":"2023-12-04T11:41:01+00:00","og_image":[{"width":1098,"height":545,"url":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/11\/image-19.png","type":"image\/png"}],"author":"Ruian Ding","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ruian Ding","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/#article","isPartOf":{"@id":"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/"},"author":{"name":"Ruian Ding","@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b"},"headline":"Internet Protocols \u2013 Transport Layer Security (TLS)","datePublished":"2023-11-09T13:28:49+00:00","dateModified":"2023-12-04T11:41:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/"},"wordCount":374,"publisher":{"@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b"},"image":{"@id":"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/11\/image-19.png","keywords":["NETWORK"],"articleSection":["Protocols"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/","url":"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/","name":"Internet Protocols \u2013 Transport Layer Security (TLS) - \u6781\u7b80IT\uff5cSimpleIT","isPartOf":{"@id":"https:\/\/www.ruianding.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/#primaryimage"},"image":{"@id":"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/11\/image-19.png","datePublished":"2023-11-09T13:28:49+00:00","dateModified":"2023-12-04T11:41:01+00:00","breadcrumb":{"@id":"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/#primaryimage","url":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/11\/image-19.png","contentUrl":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/11\/image-19.png","width":1098,"height":545},{"@type":"BreadcrumbList","@id":"https:\/\/www.ruianding.com\/blog\/popular-internet-portocols-transport-layer-security-tls\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ruianding.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Internet Protocols \u2013 Transport Layer Security (TLS)"}]},{"@type":"WebSite","@id":"https:\/\/www.ruianding.com\/blog\/#website","url":"https:\/\/www.ruianding.com\/blog\/","name":"Ruian's Tech Troubleshooting Toolbox","description":"Debug the World.","publisher":{"@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b"},"alternateName":"\u4e01\u777f\u5b89\u7684\u6280\u672f\u5206\u4eab\u535a\u5ba2","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ruianding.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b","name":"Ruian Ding","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/05\/logo.png","contentUrl":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/05\/logo.png","width":284,"height":284,"caption":"Ruian Ding"},"logo":{"@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/image\/"},"description":"I am currently a Support Specialist at NIO, focusing on cloud-related issues for NIO Power. Previously, at Microsoft Entra ID, I specialized in identity and access management (IAM), including device registration, Windows Hello for Business (WHfB), multi-factor authentication (MFA), and single sign-on (SSO). In addition to my core expertise, I have a strong foundation in Active Directory, Servers, Cloud Computing, Network Administration, and Front-end Web Development. This diverse technical skill set enables me to effectively handle a wide range of challenges in a fast-paced IT environment.","sameAs":["https:\/\/www.ruianding.com"],"url":"https:\/\/www.ruianding.com\/blog\/author\/ruiand\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/posts\/1157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/comments?post=1157"}],"version-history":[{"count":11,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/posts\/1157\/revisions"}],"predecessor-version":[{"id":1287,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/posts\/1157\/revisions\/1287"}],"wp:attachment":[{"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/media?parent=1157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/categories?post=1157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/tags?post=1157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}