首页> 外文期刊>Windows Developer Magazine >Using Trusted Public Keys in SSL Connections
【24h】

Using Trusted Public Keys in SSL Connections

机译:在SSL连接中使用受信任的公钥

获取原文
获取原文并翻译 | 示例
       

摘要

In The Microsoft .NET Framework, it's possible for unauthorized third parties to gather information about SSL connections that your client code makes to remote secure servers. Among other things, the public key of the remote server can be examined. It is commonplace in non-Windows environments for the identity of remote servers to be determined not by an arbitrary certificate chain rooted at any one of dozens of trusted root Certifying Authorities (CA) who can issue trusted certificates, but based instead on a particular public key that is known to belong to a remote server. Any change of public key, even with the same or similar certificate chain, represents a severe security risk because the only symptom of a well-executed man-in-the-middle (MITM) or spoofing attack against an SSL-based system will be a change of public key offered by the server, along with the certificate chain that allegedly proves the trustworthiness of the server's identity. There are any number of ways for an attacker to gain control over a certificate chain and key pair that will validate against the assortment of root CA certificates trusted by default in Windows. Only by fixing trust on a particular known-good public key can important SSL-based communications safely authenticate the identity of a trusted remote server. This article shows how to add this critically important security countermea-sure to your client-side SSL code so that an attacker will be unable to mount an MITM or spoofing attack at the server side unless the attacker can steal the authentic server's key pair, succeed in the difficult task of breaking SSL cryptographic algorithms through cryptanalysis, or exploit a software bug that compromises the entire process.
机译:在Microsoft .NET Framework中,未经授权的第三方可能会收集有关客户端代码与远程安全服务器建立的SSL连接的信息。除其他外,可以检查远程服务器的公钥。在非Windows环境中,通常不是由任意证书链来确定远程服务器的身份,该证书链植根于数十个可颁发受信任证书的受信任根证书颁发机构(CA)中的任何一个,而是基于特定的公共对象已知属于远程服务器的密钥。公钥的任何更改(即使具有相同或相似的证书链)也都构成了严重的安全风险,因为对基于SSL的系统执行良好的中间人(MITM)或欺骗攻击的唯一症状是服务器提供的公钥更改以及据称证明服务器身份可信赖的证书链。攻击者可以通过多种方法来控制证书链和密钥对,这些证书链和密钥对将根据Windows默认情况下信任的根CA证书的种类进行验证。仅通过在特定的已知有效公钥上固定信任关系,基于SSL的重要通信才能安全地验证可信远程服务器的身份。本文介绍了如何向客户端SSL代码中添加此至关重要的安全对策,以便攻击者无法在服务器端进行MITM或欺骗攻击,除非攻击者可以窃取真实服务器的密钥对,否则成功通过密码分析来打破SSL密码算法这一艰巨的任务,或者利用破坏整个过程的软件错误。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号