The security of the HTTPS protocol relies on its certificate mechanism. If an attacker applies for a certificate that is exactly the same as your website, the security mechanism of your website will no longer exist. This article will talk about how to prevent HTTPS certificate forgery. Certificate hijacking If you want to deploy an HTTPS website, you must first apply for a certificate from a CA. After verifying the identity of the applicant, the CA will issue a certificate that contains the host name and public key of the applicant's website. The CA will also sign the entire certificate with its own private key, add the signature to the certificate file, and then send it to the applicant. Certificates are a critical part of the TLS protocol, and their main functions are:
The biggest problem with HTTPS certificates is the existence of forged certificates. Once a forged certificate appears, the security system will be very vulnerable. The reasons for forged certificates are as follows:
At this time, the certificate user may have the following confusion:
Certificate Transparency In order to solve the potential problems of certificates, Google proposed a solution, which is Certificate Transparency (CT). CT is a set of technical solutions that can audit and monitor the issuance and use of certificates to make them more transparent. It is not a substitute solution for certificates, but an effective supplement to certificates. Through CT, the following goals can be achieved:
The technology used by the CT log service is very similar to blockchain technology. Cryptography (Merkle hash tree) ensures that data can only grow, but modifications, insertions, and deletions will be discovered. Since the cost of auditing a single piece of data is not high, the auditor can be a separate service, a function of the observer, or even part of the client. Expect-CT To ensure that browsers can take action when accessing certificates that lack CT supervision (such as certificates accidentally issued by CAs), Google proposed adding a new Expect-CT HTTP Header, which is used to tell the browser to expect the use of certificate transparency services. The Expect-CT CT header allows sites to choose to report or enforce certificate transparency requirements, which can prevent site certificate errors from being ignored. When a site enables the Expect-CT CT Header, the browser will check whether the certificate used by the site appears in the public CT log, which can effectively avoid HTTPS threats such as man-in-the-middle attacks and make the site more secure.
There are two strategies to choose from when deploying, one is report-only and the other is enforcement. In the report-only strategy, the browser will send a report to the address set by report-uri if it does not receive valid CT information. For this strategy, you can set it as follows:
Under this policy, if the browser does not receive valid CT information, it will not terminate the connection, but will only send a report to the URI you specified. The second policy can be set as follows:
This tells the browser to enforce the CT policy and cache the state for 30 seconds. If the browser does not receive valid CT information, it will terminate the connection and send a report. After configuring the CT information correctly, you can set this time longer. |
<<: The Advancement of WiFi 6 Wireless Router Market Report for the First Half of 2020
>>: HTTP working principle and case analysis
According to an assessment report released by the...
A friend asked about the discounts of 10gbiz this...
I received an email from SmartHost, informing me ...
20 billion daily traffic, Ctrip gateway architect...
Although the top leadership has once again clarif...
Residents are excited about and choosing to live ...
TNAHosting recently held a Happy Near Year event,...
DediPath has just launched a spring promotion, of...
Many people may not know that the traditional rad...
For the convenience of many friends, panels are d...
LOCVPS is a long-established Chinese VPS service ...
It has been more than half a year since I shared ...
Lisahost has launched a new Hong Kong ISP-type na...
[[426618]] On the 29th, the Semiconductor Industr...