HTTPS

作者: whenitsallover | 来源:发表于2018-03-25 23:34 被阅读0次

    official site:
    https://en.wikipedia.org/wiki/HTTPS

    HTTPS (HTTP Secure) is an adaptation of the Hypertext Transfer Protocol (HTTP) for secure communication over a computer network, and is widely used on the Internet.[1][2] In HTTPS, the communication protocol is encrypted by Transport Layer Security (TLS), or formerly, its predecessor, Secure Sockets Layer (SSL). The protocol is therefore also often referred to as HTTP over TLS,[3] or HTTP over SSL.[4]

    The principal motivation for HTTPS is authentication of the accessed website and protection of the privacy and integrity of the exchanged data. It protects against man-in-the-middle attacks. The bidirectional encryption of communications between a client and server protects against eavesdropping and tampering of the communication.

    Technical

    Difference from HTTP

    HTTPS URLs begin with "https://" and use port 443 by default, whereas HTTP URLs begin with "http://" and use port 80 by default.

    HTTP is not encrypted and is vulnerable to man-in-the-middle and eavesdropping attacks, which can let attackers gain access to website accounts and sensitive information, and modify webpages to inject malware or advertisements. HTTPS is designed to withstand such attacks and is considered secure against them (with the exception of older, deprecated versions of SSL).

    Network layers

    HTTP operates at the highest layer of the TCP/IP model, the Application layer; as does the TLS security protocol (operating as a lower sublayer of the same layer), which encrypts an HTTP message prior to transmission and decrypts a message upon arrival. Strictly speaking, HTTPS is not a separate protocol, but refers to use of ordinary HTTP over an encrypted SSL/TLS connection.

    Everything in the HTTPS message is encrypted, including the headers, and the request/response load.

    Server setup

    To prepare a web server to accept HTTPS connections, the administrator must create a public key certificate for the web server.

    Limitations

    SSL and TLS encryption can be configured in two modes: simple and mutual.

    SSL/TLS does not prevent the indexing of the site by a web crawler, and in some cases the URI of the encrypted resource can be inferred by knowing only the intercepted request/response size.[36] This allows an attacker to have access to the plaintext (the publicly available static content), and the encrypted text (the encrypted version of the static content), permitting a cryptographic attack.

    What is a SSL certificate?

    SSL stands for Secure Sockets Layer, a global standard security technology that enables encrypted communication between a web browser and a web server. It is utilized by millions1 of online businesses and individuals to decrease the risk of sensitive information (e.g., credit card numbers, usernames, passwords, emails, etc.) from being stolen or tampered with by hackers and identity thieves. In essence, SSL allows for a private “conversation” just between the two intended parties.

    To create this secure connection, an SSL certificate (also referred to as a “digital certificate”) is installed on a web server and serves two functions:

    It authenticates the identity of the website (this guarantees visitors that they’re not on a bogus site)

    It encrypts the data that’s being transmitted

    SSL's role in HTTPS:
    SSL Certificates are the secret handshake between web browsers and servers. When you visit an HTTPS connection to a web page, the website’s SSL certificate is sent to your browser and a uniquely secure connection between yourself and the website is established. There are a variety of SSL Certificates you can choose from ranging from Brand, price point and level of protection.

    相关文章

      网友评论

          本文标题:HTTPS

          本文链接:https://www.haomeiwen.com/subject/auflcftx.html