捆绑证书、安装嵌入式证书、实施并不重要。如果您认为是这种情况,那么您就错过了证书的底层处理。
当通过 PKI 基础设施建立连接时,它通常按如下方式工作:
Client (with cert) --> before connection is made, let me consult CA --> Internet
Client (with cert) --> Hey CA is this cert being used valid --> Internet CA
CA --> checks cert information
CA --> Valid cert? --> Yes --> This is a valid cert --> Client
CA --> Valid cert? --> No --> This is NOT A VALID cert --> Client
攻击者发生的情况是 a) 他们可以用STOLEN - SIGNED CERT替换您的有效证书,并且发生上述情况:
Client (with signed STOLEN cert) --> Let me consult CA --> Internet
Client (with signed STOLEN cert) --> Hey CA is this cert valid?
CA --> checks cert information
(cert was not revoked)
CA --> Yes --> This is a valid cert --> Client
从我正在阅读的内容来看,如果在建立连接时只会使用指定的证书并且攻击者无法完全替换该证书的印象。实现这一目标需要大量的编程。事实上,软件供应商必须为每个客户编写 N 次迭代才能实现这一目标。否则,证书是证书是证书...