TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: How well protected are SSL certificates?

8 点作者 vrypan将近 12 年前
I'm no expert in this, and I'd like your input: How well is the SSL certificate infrastructure protected? Could the NSA obtain the SSL certificate of let's say, mail.google.com? Or, even worst, could they get their hands on the certificates of a CA? If so, they could intercept almost any communication over HTTPS by using a man-in-the-middle attack, right?

2 条评论

parliament32将近 12 年前
Yes.<p>The NSA can go to any provider and say &quot;We want your private cert. Also you&#x27;re not allowed to tell anybody about this. Because terrorism.&quot;<p>If your site is externally hosted, they can go to your hosting provider and take your private cert without you ever knowing.<p>This private cert will let them decrypt any TLS&#x2F;SSL traffic they may have captured in the past.[1]<p>They can also MITM any TLS&#x2F;SSL connection if they have their hands in a single root CA.[2]<p>[1]PFS can prevent this, but only Google and Bloomberg use it right now. See (<a href="http://en.wikipedia.org/wiki/Perfect_forward_secrecy" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Perfect_forward_secrecy</a>).<p>[2]Certificate pinning can prevent this, but only Google and MS use it right now. See (<a href="http://security.stackexchange.com/questions/29988/what-is-certificate-pinning" rel="nofollow">http:&#x2F;&#x2F;security.stackexchange.com&#x2F;questions&#x2F;29988&#x2F;what-is-ce...</a>) and (<a href="http://tack.io/" rel="nofollow">http:&#x2F;&#x2F;tack.io&#x2F;</a>).
ProblemFactory将近 12 年前
The SSL infrastructure is protected only by the shaky assumption that &quot;all CAs are responsible and would never create a certificate for anyone but the true owner of the domain.&quot;<p>Here is a list of root CAs in Firefox: <a href="https://docs.google.com/spreadsheet/pub?key=0Ah-tHXMAwqU3dGx0cGFObG9QM192NFM4UWNBMlBaekE&amp;single=true&amp;gid=1&amp;output=html" rel="nofollow">https:&#x2F;&#x2F;docs.google.com&#x2F;spreadsheet&#x2F;pub?key=0Ah-tHXMAwqU3dGx...</a><p>Not just NSA, but <i>all</i> of those organisations can create a valid SSL certificate for mail.google.com, and your browser would accept it silently.