TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Client-side SSL/TLS MITM, compromised CA and server impersonation detection

38 点作者 cbolat超过 11 年前

3 条评论

geoffhill超过 11 年前
I like this idea a lot!<p>A less powerful solution implemented completely locally: A &quot;known_hosts&quot; file for SSL certificates for repeat visits. As long as you&#x27;ve visited a site once before, any subsequent visits will be safe.<p>To deal with certificate upgrades, certificate Y could present a signed verification that it obsoletes a past certificate X. Then, when a client that trusts certificate X receives certificate Y, it can update its &quot;known_hosts&quot; file accordingly. This change would require more than just local changes, but remote cooperation.
评论 #6463608 未加载
Nanzikambe超过 11 年前
Interesting, but doesn&#x27;t this pretty much assume that the MITM isn&#x27;t occurring in the last hops of the path to the server?<p>If all paths (including those through Tor) lead through a piece of compromised infrastructure (a rogue access-point like a pineapple, or subverted router) both will report that the site uses the same certificate despite the MITM.
jarito超过 11 年前
How is the different from convergence.io? What does using Tor offer over Moxie&#x27;s approach? An existing network of machines?
评论 #6464628 未加载