TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: HTTPS and SSL Proxy security question

4 点作者 fakeElonMusk超过 3 年前
I&#x27;m not a security expert but I always thought that HTTPS was secure and that if my code was calling an API (for example) with HTTPS&#x2F;SSL Cert that it was encrypted end to end. Rephrase, I know it&#x27;s encrypted but I&#x27;m aware that MITM or SSL Proxy methods can be used to expose that traffic by spoofing client&#x2F;server keys.<p>So I assume that someone has to be on your network to use a tool like Charles Proxy. Is the combination of securing your network plus HTTPS &quot;enough&quot; security to keep web and app traffic safe? What are other aspects I&#x27;m missing? Would love to learn more if anyone is willing to share some good resources. TIA.

3 条评论

toast0超过 3 年前
HTTPS is secure point to point. It&#x27;s easy to make an HTTPS endpoint that displays your request via skywriter or whatever. There should be no guarantee or suggestion that having https along one part of the journey means the whole thing is secure (but you do&#x2F;did get a lock icon in the browser).<p>Protection from MITM with HTTPS and TLS in general relies on certificate validation (or exotic key setup). Commonly used browsers do a good job (baring whatever security issues are found from time to time), but apps are mixed.<p>Sometimes they accept any certificate, from any issuer, including self-signed certificates. Sometimes, the certificate needs to match the domain, but any issuer is fine, including self-signed. Sometimes, the certificate needs to match the domain and be issued by a widely accepted CA. Sometimes, the certificate needs to be issued by one of a small list of issuers, but any domain is fine. Sometimes, the certificate needs a matching domain and be from a small list of issuers.<p>Also, not all apps check certificate expiration. There are a lot of ways to do it wrong here, so the app says https or uses port 443 or even wireshark shows TLS doesn&#x27;t tell you much.
noduerme超过 3 年前
This would be better asked on StackOverflow, or something; HN isn&#x27;t really the place for this kind of question. But okay, in a nutshell, Charles and other proxies can only work to decode SSL traffic if the whole session goes <i>through them</i> which is why they are called a proxy -- they read the certificate from the external site, decode that site and send it to the browser, and then re-encode the browser response. So your browser, when running Charles, is talking to Charles in clear text, unencrypted. Charles is talking to the HTTPS site.<p>So someone outside your network and the destination server cannot read your HTTPS calls at all. Someone inside your network <i>could</i> read your traffic if they tricked your browser into talking through a proxy instead of talking directly out across the internet. This is why you should never use captive portals &#x2F; hotel WiFi that replaces SSL certificates with their own, because they&#x27;re acting as a proxy for your traffic.<p>But in broad terms, if you are connecting directly to an external site without use of a proxy, HTTPS is secure end to end.
评论 #29024983 未加载
high_byte超过 3 年前
end-to-end encryption means that the underlying data is visible only on both ends, hence safe to transport via any medium. if for instance someone performs MITM, anywhere along the line, won&#x27;t allow them to decrypt the data.<p>replacing certificates requires control of either machine, in which case you&#x27;d have bigger problems.<p>then there&#x27;s the question of how secure is the encryption, which is a rabbit hole of it&#x27;s own: key size, random generator effectiveness, correct padding, correct implementation or even which layer eg. HTTPS still has exposed SNI, and it goes on and on...
评论 #29027577 未加载