-
Notifications
You must be signed in to change notification settings - Fork 5
/
Lecture 18 Fork Consistency Certificate Transparency.srt
4716 lines (3926 loc) · 135 KB
/
Lecture 18 Fork Consistency Certificate Transparency.srt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1
00:00:03,380 --> 00:00:11,969
大家好,我们开始吧,我想谈谈一个叫做
alright hello everyone let's get started
I want to talk about a system called
2
00:00:11,969 --> 00:00:18,960
今天的证书透明性与大多数
certificate transparency today and this
is a bit of a departure from most of the
3
00:00:18,960 --> 00:00:23,100
到目前为止,我们讨论的主题是关于分布式系统的
topics we talked about so far we've
talked about distributed systems that
4
00:00:23,100 --> 00:00:27,750
是真正的封闭系统,所有参与者都是值得信赖的
are really closed systems where all the
participants are trustworthy they're all
5
00:00:27,750 --> 00:00:32,488
可能是由同一类型的相互信任的组织运行的
maybe be run being run by the same sort
of mutually trusting organization like
6
00:00:32,488 --> 00:00:36,059
这样,您就知道您只是假设在皇家空军的各个级别
rafters that way you know you just
assume at the RAF's tiers do what
7
00:00:36,059 --> 00:00:42,570
他们本来应该做的,但是那里也有很多系统
they're supposed to do but there's also
plenty of systems out there particularly
8
00:00:42,570 --> 00:00:48,270
系统建立了一个互联网规模,其中系统是开放的,任何人
systems sort of built an internet scale
where the systems are open and anyone
9
00:00:48,270 --> 00:00:54,149
可以成为积极的参与者,我的意思是在一些大型系统中
can participate being active participant
I mean in some big systems out there and
10
00:00:54,149 --> 00:01:01,289
如果您以这种方式构建完全开放的系统,那么通常不会
if you build systems that are completely
open in that way there's often no single
11
00:01:01,289 --> 00:01:06,450
所有人都愿意信任的权威机构
universally trusted Authority that
everybody is willing to trust to run the
12
00:01:06,450 --> 00:01:11,010
系统或保护它,这就是每个人都有可能
system or to protect it that is
everybody you sort of potentially
13
00:01:11,010 --> 00:01:16,560
互相怀疑其他所有人,如果是这种情况,您必须
mutually suspicious of everyone else and
if that's the situation you have to be
14
00:01:16,560 --> 00:01:23,700
能够从互不信任的部分中构建有用的系统
able to build useful systems out of
mutually distrusting pieces and this
15
00:01:23,700 --> 00:01:27,930
在任何种类的互联网开放系统中进行信任和安全性排序
makes in any sort of internet wide open
systems to make trust and security sort
16
00:01:27,930 --> 00:01:31,979
设计分布式系统时遇到的顶级系统问题
of top level systems issues when you're
thinking about designing a distributed
17
00:01:31,979 --> 00:01:37,619
系统,因此构建开放系统时最基本的问题是何时
system so the most basic question when
you're building an open system is when
18
00:01:37,619 --> 00:01:41,640
我正在与另一台计算机或您需要知道的其他人说话
I'm talking to another computer or
another person you need to know are you
19
00:01:41,640 --> 00:01:46,049
与正确的其他计算机通话,或者您在与正确的网站通话,以及
talking to the right other computer or
are you talking to the right website and
20
00:01:46,049 --> 00:01:51,869
这个问题实际上几乎是无法解决的,事实证明
this problem is actually close to
unsolvable it turns out there's really
21
00:01:51,869 --> 00:01:56,939
有很多解决方案,但没有一个真的能很好地解决问题,但这是
there's lots of solutions and none
really work that well but it is the
22
00:01:56,939 --> 00:02:04,170
证书透明性是当今主题试图解决的问题
problem that certificate transparency
today's topic is trying to help with the
23
00:02:04,170 --> 00:02:08,788
事实证明,今天的物质在整个过程中会有些倒退
material today ties sort of backwards in
the course to consistency it turns out
24
00:02:08,788 --> 00:02:12,209
证书透明度所做的很多工作是确保
that a lot of what certificate
transparency do doing is ensuring that
25
00:02:12,209 --> 00:02:16,230
各方看到有关证书的相同信息
all parties see
the same information about certificates
26
00:02:16,230 --> 00:02:21,120
这是一个真正的一致性问题,该材料也与区块链相关
that's a real consistency issue and this
material also ties forward to blockchain
27
00:02:21,120 --> 00:02:26,000
像区块链这样的系统,这就是我们下周要讨论的
systems like blockchain which is what we
talk talking about next week a
28
00:02:26,000 --> 00:02:32,010
证书透明性是相对较少的非加密货币用途之一
certificate transparency is among the
relatively few non cryptocurrency uses
29
00:02:32,010 --> 00:02:39,690
像设计这样的区块链的概念,所以作为介绍,我想开始
of a blockchain like design alright so
by way of introduction I want to start
30
00:02:39,690 --> 00:02:47,340
随时随地通过网络安全来应对网络上的情况
with the situation on the web with web
security at any rate as it existed
31
00:02:47,340 --> 00:02:56,280
1995年之前的证书之前,所以这是1995年的,特别是
before 1995 before certificates so this
is for 1995 and in particular there was
32
00:02:56,280 --> 00:03:00,150
在那些日子里,人们担心的是一种攻击
a there was a kind of attack in those
days that people were worried about
33
00:03:00,150 --> 00:03:06,740
称为中间人攻击,这是人在
called a man-in-the-middle attacks this
is man in
34
00:03:07,420 --> 00:03:14,200
中间,这是一类攻击类型的名称,所以您知道
middle and this is a name for a class of
attacks style of attack so you know the
35
00:03:14,200 --> 00:03:20,770
在那些日子里建立的就是你有互联网,有人在跑
set up in those days is you have the
internet and you have people running
36
00:03:20,770 --> 00:03:26,519
浏览器和我们的计算机连接在一起
browsers
um sitting with our computer attached to
37
00:03:26,519 --> 00:03:29,099
互联网坐在我电脑前的任何人
the Internet
anyone sitting in front of my computer I
38
00:03:29,099 --> 00:03:33,780
想和一个特定的服务器对话,我想做的就是与
want to talk to a specific server
exposing what I want to do is talk to
39
00:03:33,780 --> 00:03:42,209
gmail.com对,通常来说,您会与我联系DNS系统吗?
gmail.com right and ordinarily I would
you know maybe contact the DNS system I
40
00:03:42,209 --> 00:03:47,040
作为用户,我也许会输入gmail.com我会知道我想要什么
would as a user I maybe type gmail.com I
would sort of know what it was I wanted
41
00:03:47,040 --> 00:03:51,780
说出Li gmail.com的名字,我的浏览器会和DNS服务器说出什么
to talk to name Li gmail.com my browser
would talk to DNS servers say what's
42
00:03:51,780 --> 00:03:56,190
gmail.com,它将回复一个我连接了该IP地址的IP地址,
gmail.com it would reply with a IP
address I connected that IP address and
43
00:03:56,190 --> 00:04:00,060
您知道我需要进行身份验证,所以我可能会输入密码
you know I need to authenticate myself
so I'd probably type my password to
44
00:04:00,060 --> 00:04:08,190
从Gmail转到Gmail的网站,然后Gmail会向我显示没有任何形式的电子邮件
Gmail to Gmail's website and then Gmail
would show me my email without some kind
45
00:04:08,190 --> 00:04:12,629
为了安全起见,这个系统实际上很容易被攻击和转向
of story for security this system is
actually quite easy to attack and turn
46
00:04:12,629 --> 00:04:19,680
易于攻击,一种攻击方式是所谓的“攻击”
out to be easy to attack and the one
style of attack is that what's called a
47
00:04:19,680 --> 00:04:25,830
中间人攻击,其中一些邪恶的人设置了另一个Web服务器,该服务器
man-in-the-middle attack where some evil
person sets up a another web server that
48
00:04:25,830 --> 00:04:30,240
提供与Gmail Web服务器类似的页面,就像您上次登录时一样
serves pages that look just like Gmail
web servers like the last for your login
49
00:04:30,240 --> 00:04:39,120
和密码正确,然后攻击者可能会拦截我的DNS数据包或
and password right and then the attacker
would maybe intercept my DNS packets or
50
00:04:39,120 --> 00:04:43,830
只是猜测我什么时候会发送DNS数据包并提出虚假答复
just guess when I would have sent a DNS
packet and come up with a fake reply
51
00:04:43,830 --> 00:04:49,889
而不是提供真实gmail.com服务器的真实IP地址
that instead of providing the real IP
address of the real gmail.com server
52
00:04:49,889 --> 00:04:54,510
将提供攻击者的假冒计算机的电子邮件地址,然后
would provide the email address of ma of
the attackers fake computer and then the
53
00:04:54,510 --> 00:05:00,660
用户的浏览器而不是与Gmail通话实际上对他们来说是未知的
user's browser instead of talking to
Gmail would actually unknown to them be
54
00:05:00,660 --> 00:05:04,020
与攻击者计算机交谈,攻击者计算机将提供一个网站
talking to the attackers computer the
attackers computer would provide a web
55
00:05:04,020 --> 00:05:08,520
页面看起来就像一个登录页面,用户类型是路径日志和密码,以及
page looks just like a login page user
types are paths log and a password and
56
00:05:08,520 --> 00:05:14,099
现在,攻击者的计算机可以将其转发给您的真实Gmail登录名。
now the attackers computer can forward
that to the real Gmail login for you of
57
00:05:14,099 --> 00:05:18,810
当然您不知道您知道将当前的收件箱还给攻击者
course you don't know that you know get
your current inbox back to the attackers
58
00:05:18,810 --> 00:05:22,680
大概会与您的密码一起记录下来然后发送的计算机
computer which presumably records it
along with your password and then sends
59
00:05:22,680 --> 00:05:28,260
您的收件箱或浏览器中的任何内容,这可以使您知道是否可以
your inbox or whatever to the browser
and this allows a you know if you can
60
00:05:28,260 --> 00:05:32,639
进行攻击者计算机可以记录的这种中间人攻击
execute this kind of man-in-the-middle
attack the attackers computer can record
61
00:05:32,639 --> 00:05:35,580
您的密码记录了您的电子邮件,您将永远不再明智
your password record your email and
you'll never be the wiser
62
00:05:35,580 --> 00:05:40,560
以及SSL和HTTPS上的证书之前
and
before certificates on SSL and HTTPS
63
00:05:40,560 --> 00:05:46,260
真的没有防御这个妈妈的办法,所以这是那个男人
there was really no defense against this
mom okay so this is the man in the
64
00:05:46,260 --> 00:05:50,910
中间攻击,这里的攻击者是中间的人,就像
middle attack and this attacker here is
the man in the middle looks just like
65
00:05:50,910 --> 00:05:54,900
与浏览器交谈时,假装浏览器的Gmail是用户,因此
Gmail to the browser pretends to be the
user when talking to Gmail so that it
66
00:05:54,900 --> 00:05:59,070
可以真正从Gmail中获取诱使用户进入的信息
can actually get the information from
Gmail required to trick the user into
67
00:05:59,070 --> 00:06:05,940
认为这真的可以使用Gmail,所以这是90年代中期的攻击
thinking it's really Gmail all right so
this is the attack in the mid-90s people
68
00:06:05,940 --> 00:06:14,070
提出了带有SSL的证书,或者也称为TLS,这就是
came up with certificates with SSL or
it's also called TLS it's what the
69
00:06:14,070 --> 00:06:20,990
协议使用HTTPS链接时使用的安全协议um
protocol the security protocol that
you're using when you use HTTPS links um
70
00:06:20,990 --> 00:06:28,880
而这里的游戏是Gmail通讯将具有一个公共/私有密钥对
and here the game was that Gmail comm
was gonna have a public/private key pair
71
00:06:28,880 --> 00:06:38,280
因此我们只有一个私钥,只有Gmail知道该私钥位于其服务器中,
so we'd have a private key that only
Gmail knows sitting in its server and
72
00:06:38,280 --> 00:06:44,430
然后,当您与用户的连接良好时,您会在需要连接的地方进行连接
then when you connect well your the user
you connect somewhere you ask to connect
73
00:06:44,430 --> 00:06:50,400
到您知道的Gmail,并且为了验证您是否真的在与Gmail通话,
to Gmail you know and in order to verify
that you're really talking to Gmail the
74
00:06:50,400 --> 00:06:55,140
要求使用Gmail的用户证明它确实拥有Gmail是私钥
users going to demand Gmail prove that
it really owns Gmail is private key well
75
00:06:55,140 --> 00:06:58,620
当然,您的浏览器在哪里可以找到Gmail
of course
where does your browser find out Gmail
76
00:06:58,620 --> 00:07:03,870
是Gmail公钥中的私钥,您需要检查该私钥
is private key from your Gmail public
key which is what you need to check that
77
00:07:03,870 --> 00:07:07,830
它确实具有私钥,还有证书的概念
it really has the private key there's
also this notion of certificate
78
00:07:07,830 --> 00:07:11,910
机构和证书,因此在Gmail时会有证书机构
authorities and certificates so there'd
be a certificate authority when Gmail
79
00:07:11,910 --> 00:07:15,960
设置其服务器,它将与证书颁发机构联系
set up its server it would contact the
certificate authority may be on the
80
00:07:15,960 --> 00:07:19,370
电话或通过电子邮件或其他方式说出您知道我想要的证书
phone or by email or something and say
look you know I want a certificate for
81
00:07:19,370 --> 00:07:25,979
DNS名称gmail.com和证书颁发机构会尝试一下
the DNS name gmail.com and the
certificate authority would sort of try
82
00:07:25,979 --> 00:07:30,419
验证哦,是的,要求证书的人确实拥有该名称
to verify that oh yes whoever's asking
for certificate really owns that name
83
00:07:30,419 --> 00:07:35,280
确实是Google或拥有gmail.com的人,如果是,则证书
it really is Google or whoever owns
gmail.com and if so the certificate
84
00:07:35,280 --> 00:07:38,750
当局会提供证明书
authority would provide a certificate
85
00:07:39,350 --> 00:07:43,090
回到gee komm这基本上是什么证书
back to gee
komm which basically what a certificate
86
00:07:43,090 --> 00:07:57,120
包含Web服务器的名称,Web服务器的公共密钥和一个
contains is the name of the web server
the web servers public key and a
87
00:07:57,120 --> 00:08:04,540
由证书颁发机构私人对此证书进行签名
signature over this certificate made
with the certificate authorities private
88
00:08:04,540 --> 00:08:11,080
密钥,因此这是一种可通过检查
key so this is sort of a self-contained
assertion checkable by checking the
89
00:08:11,080 --> 00:08:15,310
证书颁发机构对公众的声明进行签名
signature an assertion by the
certificate authority that the public
90
00:08:15,310 --> 00:08:21,340
gmail.com的密钥确实是这个公共密钥gmail.com服务器,我只保留一个
key of gmail.com is really this public
key gmail.com server would I just keep a
91
00:08:21,340 --> 00:08:27,010
如果您使用HTTPS首先连接到gmail.com服务器,则证书的副本
copy of the certificate if you connect
to gmail.com server with HTTPS the first
92
00:08:27,010 --> 00:08:32,169
它所做的是将您的证书发回给您
thing it does is sends you back this
certificate at this point is just a
93
00:08:32,169 --> 00:08:35,140
由于gmail.com愿意将证书颁发给
certificate right now of course since
gmail.com is willing to give it to
94
00:08:35,140 --> 00:08:38,979
任何人都是证书本身根本没有怀孕,这是相当公开的
anybody it's the certificate itself is
not at all pregnant it's quite public
95
00:08:38,979 --> 00:08:44,560
然后浏览器会发送一些信息,例如
and then the browser would send some
information like a random number for
96
00:08:44,560 --> 00:08:53,350
以服务器为例,并要求其使用其私钥对其进行签名,然后
example to the server and ask it to sign
it with its private key and then the
97
00:08:53,350 --> 00:08:57,790
浏览器可以使用证书中的公钥随机检查
browser can check using the public key
in the certificate that the random
98
00:08:57,790 --> 00:09:02,680
号码已经运行,并且记住确实是由私钥签名的
number is ran and remember was really
signed by the private key that's
99
00:09:02,680 --> 00:09:05,980
与证书中的公钥相关联,因此无论谁
associated with the public key in the
certificate and therefore that whoever
100
00:09:05,980 --> 00:09:10,510
所谈论的实际上是证书颁发机构认为的实体
it's talking to is really the entity
that the certificate authority believes
101
00:09:10,510 --> 00:09:15,279
是gmail.com,现在可以了,这就是为什么这使得中间人
is gmail.com all right and now the
reason why this makes man-in-the-middle
102
00:09:15,279 --> 00:09:20,950
攻击更难的是,是的,您知道您可以设置一个流氓服务器,
attacks much harder is that yeah you
know you can set up a rogue server that
103
00:09:20,950 --> 00:09:25,420
看起来就像Gmail一样平静,也许您甚至可以破解DNS系统,
looks just like Gmail calm and maybe you
can even hack the DNS system indeed you
104
00:09:25,420 --> 00:09:32,380
如果您足够聪明,功能仍然强大,可以入侵DNS系统以告知
still can if you're sufficiently clever
powerful hack the DNS system to tell
105
00:09:32,380 --> 00:09:36,940
人们的浏览器,哦,他们应该转到您的服务器而不是gmail.com,但是
people's browsers that oh they should go
to your server instead of gmail.com but
106
00:09:36,940 --> 00:09:40,000
一旦有人的浏览器联系您的服务器
once somebody's browser contacts your
server
107
00:09:40,000 --> 00:09:46,120
您大概不会能够出示如下证明:
you're not presumably going to be able
to produce a certificate that says but
108
00:09:46,120 --> 00:09:50,170
您可以生成Gmail证书,然后生成Gmail证书作为Gmail的
you you can produce Gmail certificate
but then Gmail certificate as Gmail's
109
00:09:50,170 --> 00:09:53,820
公钥您的服务器没有私钥,因此您可以
public key your server doesn't have
their private key so you can
110
00:09:53,820 --> 00:09:58,320
签署浏览器向您发送的挑战,大概是因为您不是真正的
sign the challenge the browser sent you
and presumably since you're not the real
111
00:09:58,320 --> 00:10:01,920
Google,而不是真正的Gmail,您将无法说服
Google and not the real Gmail you're not
going to be able to persuade a
112
00:10:01,920 --> 00:10:06,660
证书颁发机构为您提供将gmail comm与关联的证书
certificate authority to give you a
certificate associating gmail comm with
113
00:10:06,660 --> 00:10:11,790
您的公钥,该单位,因此该证书计划
your public key that unit and so this
certificate scheme made
114
00:10:11,790 --> 00:10:14,700
中间人攻击要困难得多,而且您知道他们确实是
man-in-the-middle attacks quite a bit
harder and you know indeed they are
115
00:10:14,700 --> 00:10:21,810
现在因为证书还可以,所以难度更大了,尽管如此
quite a bit harder now because of
certificates okay so it turns out though
116
00:10:21,810 --> 00:10:27,680
人们现在对证书计划有很多经验
that the certificate scheme as people
now have a lot of experience with it
117
00:10:27,680 --> 00:10:32,550
拥有将近25年的经验,所以我们现在知道有些事情
almost 25 years experience within so we
now know there's some kind of things
118
00:10:32,550 --> 00:10:35,810
原来是在想象中会出现几个错误
that go wrong it was originally imagined
that there would just be a couple of
119
00:10:35,810 --> 00:10:40,170
值得信赖的证书颁发机构,可以很好地检查
trustworthy certificate authorities who
would do a good job of checking that
120
00:10:40,170 --> 00:10:43,860
请求真的来自他们声称来自谁的人,如果有人
request really came from who they
claimed to come from that if somebody
121
00:10:43,860 --> 00:10:46,950
为gmail.com要求该证书颁发机构提供的证书
asked for a certificate for gmail.com
that this certificate authorities would
122
00:10:46,950 --> 00:10:50,520
实际上确实验证了该请求来自所有者gmail.com
indeed actually verified that the
request came from the owner gmail.com
123
00:10:50,520 --> 00:10:57,600
并没有将证书分发给随机人进行gmail comp,但是事实证明
and not hand out certificates to random
people for gmail comp but it that turns
124
00:10:57,600 --> 00:11:02,910
对Google来说非常具有挑战性,也许您可以说服此证书
out to be very challenging for google
maybe you can convince this certificate
125
00:11:02,910 --> 00:11:06,450
权威可以说服自己来自Google的请求,但您知道
authority can convince itself that a
request comes from Google but you know
126
00:11:06,450 --> 00:11:11,670
对于仅XCOM而言,很难拥有可靠的证书颁发机构
for just XCOM that's very hard to have a
certificate authority reliably able to
127
00:11:11,670 --> 00:11:16,200
说哦,天哪,这个要求真的来自真正拥有自己的人
say oh yeah gosh this request really
came from the person who really does own
128
00:11:16,200 --> 00:11:23,640
DMS名称XCOM可以解决的一个更糟糕的问题是,
the DMS name XCOM all right a worse
problem is that while originally they
129
00:11:23,640 --> 00:11:26,370
设想只有几个证书颁发机构
were envisioned there'd be only a few
certificate authority there are now
130
00:11:26,370 --> 00:11:30,810
数以百计的证书颁发机构在那里,以及任何
literally hundreds of certificate
authorities out there and any
131
00:11:30,810 --> 00:11:38,070
证书颁发机构可以生成任何名称的证书,并且确实可以
certificate authority can generate a
certificate for any name and indeed may
132
00:11:38,070 --> 00:11:40,950
希望您被允许更改证书颁发机构(如果您是
want to you're allowed to change
certificate authorities if you're a
133
00:11:40,950 --> 00:11:46,590
网站所有者,您可以将证书颁发机构更改为您喜欢的任何人,因此
website owner you can change certificate
authority to whoever you like so there's
134
00:11:46,590 --> 00:11:49,380
没有哪个证书颁发机构对其权力有限制
no sense in which certificate
authorities have limits on their powers
135
00:11:49,380 --> 00:11:56,430
他们可以任何证书颁发机构可以产生任何证书,现在浏览器
they can any certificate authority can
produce any certificate and now browsers
136
00:11:56,430 --> 00:11:59,310
您是否知道有几百个证书颁发机构,这意味着
have you know there's a couple hundred
certificate authorities and that means
137
00:11:59,310 --> 00:12:03,210
每个浏览器内置的浏览器(例如Chrome或Firefox)或内置的某些内容
that each browser has built into it like
Chrome or Firefox or something has built
138
00:12:03,210 --> 00:12:07,320
其中所有证书的公钥列表共几百种
into it a list of the public keys of all
the certificate all couple hundred sort
139
00:12:07,320 --> 00:12:11,370
良好的权威,如果其中任何一个人已经签署了由网络产生的证书
good authorities and if any of them sign
has signed a certificate produced by web
140
00:12:11,370 --> 00:12:18,840
服务器证书可以接受的结果是,已经有
server certificates acceptable the
result of this is that there have been
141
00:12:18,840 --> 00:12:23,550
证书颁发机构多次产生伪造证书的事件
multiple incidents of certificate
authorities producing bogus certificates
142
00:12:23,550 --> 00:12:28,770
产生证明他们是Google的证书或
that is producing certificates that said
they were certificate for Google or
143
00:12:28,770 --> 00:12:34,170
Gmail或其他真实公司,但实际上是完全发布给某人的
Gmail or some other real company but
were actually issued to someone totally
144
00:12:34,170 --> 00:12:40,770
否则,绝对不会颁发Google名称之一的证书,但不会颁发
else absolutely not issued certificate
for one of Google's names but not issued
145
00:12:40,770 --> 00:12:47,850
给Google发布给其他类似的人,您知道有时这种情况只会发生
to Google issued to someone else like
and you know sometimes this happens just
146
00:12:47,850 --> 00:12:52,470
因为上级当局没有意识到他们在做
by mistake because superior Authority
doesn't realize that they're doing the
147
00:12:52,470 --> 00:12:55,080
错误的事情,有时实际上是非常恶意的,我的意思是
wrong thing and sometimes it's actually
quite malicious I mean there have
148
00:12:55,080 --> 00:12:59,880
当然是颁发给只想窥探的人的证书
certainly been certificates issued to
people who just wanted to snoop on
149
00:12:59,880 --> 00:13:02,760
人们的交通和中间人攻击,
people's traffic and mount
man-in-the-middle attacks and did
150
00:13:02,760 --> 00:13:07,740
在今天的读物中提到了“山人中间攻击”中的几个
Mountain Man the middle attacks today's
readings are mentioned a couple of these
151
00:13:07,740 --> 00:13:12,120
事件,它们特别令人困扰,因为它们很难
incidents and they're particularly
troubling because they're hard to
152
00:13:12,120 --> 00:13:15,540
阻止,因为证书颁发机构太多,而并非全部
prevent because there's so many
certificate authorities and not all of
153
00:13:15,540 --> 00:13:19,410
他们,尽管对不起,最后一个问题是
them
although sorry the last question let was
154
00:13:19,410 --> 00:13:23,520
最后一行插入框是证书上方的签名
the last line insert box it's a
signature over the certificate by the
155
00:13:23,520 --> 00:13:27,690
先生提示由证书颁发机构使用证书
sir tip using by the certificate
authorities using the certificate
156
00:13:27,690 --> 00:13:33,600
当局的私钥好,所以出现了假事件
authorities private key okay so there
have been incidents of bogus
157
00:13:33,600 --> 00:13:38,370
证书真正的网站(如Google)的证书颁发给
certificates certificates for real
websites like Google issued to totally
158
00:13:38,370 --> 00:13:43,620
错误的人和那些证书被滥用,目前尚不清楚
the wrong people and those certificates
have been abused and it's not clear how
159
00:13:43,620 --> 00:13:47,970
修复证书颁发机构系统本身以防止它们发生,因为
to fix the certificate authority system
itself to prevent them because there's
160
00:13:47,970 --> 00:13:54,210
如此众多的证书颁发机构,他们真的让您无法期望
so many certificate authorities and they
really you just can't expect that
161
00:13:54,210 --> 00:14:00,540
他们将是完全可靠的,所以我们该怎么办
they're going to be completely reliable
so what can we do about this one
162
00:14:00,540 --> 00:14:05,250
可能只有一个在线的所有有效数据库
possibility would be to have a single
online database of all valid
163
00:14:05,250 --> 00:14:09,840
证书,以便当您知道浏览器时浏览器Comcast网站web
certificates so that when a browser
you know browser Comcast websites web
164
00:14:09,840 --> 00:14:13,620
现场出示您知道或可能有效的证书,那么也许您
site hands at a certificate you know
might or might be valid then maybe you
165
00:14:13,620 --> 00:14:18,630
可以想象浏览器将联系全局有效证书数据库
could imagine the browser would contact
the global valid certificate database
166
00:14:18,630 --> 00:14:24,220
ins化验确实是证书,是连续颁发的假证书
ins assays this really is certificate
a bogus certificate issued by a row
167
00:14:24,220 --> 00:14:32,470
证书颁发机构,问题是该方法有很多问题
certificate authority um the problem is
as many problems with that approach one