超文本传输安全协议:修订间差异

求闻百科,共笔求闻
添加的内容 删除的内容
(机器人:清理不当的来源、移除无用的模板参数)
(机器人:将英文日期转换为ISO格式)
第43行: 第43行:


=== 统计 ===
=== 统计 ===
截至2018年6月,Alexa排名前100萬的網站中有34.6%使用HTTPS作為預設值<ref name="StatOperator">{{cite web|url=https://statoperator.com/research/https-usage-statistics-on-top-websites/|title=HTTPS usage statistics on top websites|last=|first=|date=|website=|publisher=statoperator.com||||accessdate=2016-06-28}}</ref>,互联网141387个最受欢迎网站的43.1%具有安全实施的HTTPS<ref name="sslpulse">{{cite web|title=SSL Pulse|url=https://www.trustworthyinternet.org/ssl-pulse/|publisher=Trustworthy Internet Movement|date=2015-10-03|accessdate=2015-10-19|||}}</ref>,以及45%的頁面載入(透過Firefox紀錄)使用HTTPS<ref>{{cite web|url=https://letsencrypt.org/2016/06/22/https-progress-june-2016.html |title=Progress Towards 100% HTTPS, June 2016 |date=22 June 2016 |first=Josh |last=Aas |publisher=[[Lets Encrypt]] |accessdate=23 July 2016}}</ref>。2017年3月,中国注册域名总数的0.11%使用HTTPS。<ref>{{Cite web|url=https://www.duzli.cn/zhong-guo-wang-luo-tong-ji|title=中国网络统计 duzli.cn|accessdate=2017-03-01|work=www.duzli.cn|language=zh|||}}</ref>
截至2018年6月,Alexa排名前100萬的網站中有34.6%使用HTTPS作為預設值<ref name="StatOperator">{{cite web|url=https://statoperator.com/research/https-usage-statistics-on-top-websites/|title=HTTPS usage statistics on top websites|last=|first=|date=|website=|publisher=statoperator.com||||accessdate=2016-06-28}}</ref>,互联网141387个最受欢迎网站的43.1%具有安全实施的HTTPS<ref name="sslpulse">{{cite web|title=SSL Pulse|url=https://www.trustworthyinternet.org/ssl-pulse/|publisher=Trustworthy Internet Movement|date=2015-10-03|accessdate=2015-10-19|||}}</ref>,以及45%的頁面載入(透過Firefox紀錄)使用HTTPS<ref>{{cite web|url=https://letsencrypt.org/2016/06/22/https-progress-june-2016.html |title=Progress Towards 100% HTTPS, June 2016 |date=2016-06-22 |first=Josh |last=Aas |publisher=[[Lets Encrypt]] |accessdate=2016-07-23}}</ref>。2017年3月,中国注册域名总数的0.11%使用HTTPS。<ref>{{Cite web|url=https://www.duzli.cn/zhong-guo-wang-luo-tong-ji|title=中国网络统计 duzli.cn|accessdate=2017-03-01|work=www.duzli.cn|language=zh|||}}</ref>


根據[[Mozilla]]統計,自2017年1月以來,超過一半的[[網站流量]]被加密<ref>{{cite web|title=We're Halfway to Encrypting the Entire Web|url=https://www.eff.org/deeplinks/2017/02/were-halfway-encrypting-entire-web|publisher=Electronic Frontier Foundation|accessdate=3 May 2017|language=en|date=21 February 2017}}</ref><ref>{{cite web|last1=Finley|first1=Klint|title=Half the Web Is Now Encrypted. That Makes Everyone Safer|url=https://www.wired.com/2017/01/half-web-now-encrypted-makes-everyone-safer/|publisher=WIRED|accessdate=1 May 2017}}</ref>。
根據[[Mozilla]]統計,自2017年1月以來,超過一半的[[網站流量]]被加密<ref>{{cite web|title=We're Halfway to Encrypting the Entire Web|url=https://www.eff.org/deeplinks/2017/02/were-halfway-encrypting-entire-web|publisher=Electronic Frontier Foundation|accessdate=2017-05-03|language=en|date=2017-02-21}}</ref><ref>{{cite web|last1=Finley|first1=Klint|title=Half the Web Is Now Encrypted. That Makes Everyone Safer|url=https://www.wired.com/2017/01/half-web-now-encrypted-makes-everyone-safer/|publisher=WIRED|accessdate=2017-05-01}}</ref>。


=== 浏览器实现 ===
=== 浏览器实现 ===
第76行: 第76行:


==== 当私钥失密时 ====
==== 当私钥失密时 ====
证书可在其过期前被吊销,通常情况是该证书的私钥已经失密。较新的浏览器如[[Google Chrome]]、[[Firefox]]<ref>{{cite web|url=http://www.mozilla.com/en-US/legal/privacy/firefox-en.html|title=Mozilla Firefox Privacy Policy|publisher=[[Mozilla基金會]]|date=27 April 2009|accessdate=13 May 2009|||}}</ref>、[[Opera]]<ref>{{cite news|url=http://news.softpedia.com/news/Opera-8-launched-on-FTP-1330.shtml
证书可在其过期前被吊销,通常情况是该证书的私钥已经失密。较新的浏览器如[[Google Chrome]]、[[Firefox]]<ref>{{cite web|url=http://www.mozilla.com/en-US/legal/privacy/firefox-en.html|title=Mozilla Firefox Privacy Policy|publisher=[[Mozilla基金會]]|date=2009-04-27|accessdate=2009-05-13|||}}</ref>、[[Opera]]<ref>{{cite news|url=http://news.softpedia.com/news/Opera-8-launched-on-FTP-1330.shtml
|title=Opera 8 launched on FTP|publisher=[[Softpedia]]|date=19 April 2005|accessdate=13 May 2009}}</ref>和运行在[[Windows Vista]]上的[[Internet Explorer]]<ref>{{cite web|url=http://msdn.microsoft.com/en-us/library/bb250503.aspx|title=HTTPS Security Improvements in Internet Explorer 7|last=Lawrence|first=Eric|publisher=[[MSDN]]|date=31 January 2006|accessdate=13 May 2009}}</ref>都实现了[[在线证书状态协议]](OCSP)以排除这种情形:浏览器将网站提供的证书的序列号通过OCSP发送给证书颁发机构,后者会告诉浏览器证书是否还是有效的。<ref>{{cite web|url=http://tools.ietf.org/html/rfc2560|title=Online Certificate Status Protocol - OCSP|publisher=[[Internet Engineering Task Force]]|author=Myers, M|coauthors=Ankney, R; Malpani, A; Galperin, S; Adams, C|accessdate=13 May 2009|date=June 1999}}</ref>
|title=Opera 8 launched on FTP|publisher=[[Softpedia]]|date=2005-04-19|accessdate=2009-05-13}}</ref>和运行在[[Windows Vista]]上的[[Internet Explorer]]<ref>{{cite web|url=http://msdn.microsoft.com/en-us/library/bb250503.aspx|title=HTTPS Security Improvements in Internet Explorer 7|last=Lawrence|first=Eric|publisher=[[MSDN]]|date=2006-01-31|accessdate=2009-05-13}}</ref>都实现了[[在线证书状态协议]](OCSP)以排除这种情形:浏览器将网站提供的证书的序列号通过OCSP发送给证书颁发机构,后者会告诉浏览器证书是否还是有效的。<ref>{{cite web|url=http://tools.ietf.org/html/rfc2560|title=Online Certificate Status Protocol - OCSP|publisher=[[Internet Engineering Task Force]]|author=Myers, M|coauthors=Ankney, R; Malpani, A; Galperin, S; Adams, C|accessdate=2009-05-13|date=1999-06}}</ref>


=== 局限 ===
=== 局限 ===
第84行: 第84行:
不管使用了哪种策略,协议所能提供的保护总强烈地依赖于浏览器的实现和服务器软件所支持的[[加密算法]]。
不管使用了哪种策略,协议所能提供的保护总强烈地依赖于浏览器的实现和服务器软件所支持的[[加密算法]]。


HTTPS并不能防止站点被[[网络蜘蛛]]抓取。在某些情形中,被加密资源的[[统一资源定位符|URL]]可仅通过截获请求和响应的大小推得,<ref>{{cite web|url=http://sysd.org/stas/node/220|title=The Pirate Bay un-SSL|last=Pusep|first=Stanislaw|date=31 July 2008|accessdate=6 March 2009|||}}</ref>这就可使攻击者同时知道明文(公开的静态内容)和密文(被加密过的明文),从而使[[选择密文攻击]]成为可能。
HTTPS并不能防止站点被[[网络蜘蛛]]抓取。在某些情形中,被加密资源的[[统一资源定位符|URL]]可仅通过截获请求和响应的大小推得,<ref>{{cite web|url=http://sysd.org/stas/node/220|title=The Pirate Bay un-SSL|last=Pusep|first=Stanislaw|date=2008-07-31|accessdate=2009-03-06|||}}</ref>这就可使攻击者同时知道明文(公开的静态内容)和密文(被加密过的明文),从而使[[选择密文攻击]]成为可能。


因为[[安全套接层|TLS]]在HTTP之下工作,对上层协议一无所知,所以TLS服务器只能为一个IP地址/端口组合提供一个证书。<ref>[http://httpd.apache.org/docs/2.0/ssl/ssl_faq.html#vhosts Apache FAQ: Why can't I use SSL with name-based/non-IP-based virtual hosts?]</ref>这就意味着在大部分情况下,使用HTTPS的同时支持[[虚拟主机|基于名字的虚拟主机]]是不很现实的。一种叫[[服务器名称指示]](SNI)的方案通过在加密连接创建前向服务器发送主机名解决了这一问题。[[Firefox]] 2、[[Opera]] 8和运行在[[Windows Vista]]的[[Internet Explorer]] 7都加入了对SNI的支持。<ref>{{cite web|url=http://blogs.msdn.com/ie/archive/2005/10/22/483795.aspx|title=Upcoming HTTPS Improvements in Internet Explorer 7 Beta 2|last=Lawrence|first=Eric|publisher=[[Microsoft]]|date=22 October 2005|accessdate=12 May 2009}}</ref><ref>[http://blog.ebrahim.org/2006/02/21/server-name-indication-sni/ Server Name Indication (SNI)]</ref><ref>{{cite web | url = https://bugzilla.mozilla.org/show_bug.cgi?id=116169 | title = Browser support for TLS server name indication | accessdate = 2010-12-15 | last = Pierre | first = Julien | format = 2001-12-19 | work = Bugzilla | publisher = Mozilla Foundation}}</ref>
因为[[安全套接层|TLS]]在HTTP之下工作,对上层协议一无所知,所以TLS服务器只能为一个IP地址/端口组合提供一个证书。<ref>[http://httpd.apache.org/docs/2.0/ssl/ssl_faq.html#vhosts Apache FAQ: Why can't I use SSL with name-based/non-IP-based virtual hosts?]</ref>这就意味着在大部分情况下,使用HTTPS的同时支持[[虚拟主机|基于名字的虚拟主机]]是不很现实的。一种叫[[服务器名称指示]](SNI)的方案通过在加密连接创建前向服务器发送主机名解决了这一问题。[[Firefox]] 2、[[Opera]] 8和运行在[[Windows Vista]]的[[Internet Explorer]] 7都加入了对SNI的支持。<ref>{{cite web|url=http://blogs.msdn.com/ie/archive/2005/10/22/483795.aspx|title=Upcoming HTTPS Improvements in Internet Explorer 7 Beta 2|last=Lawrence|first=Eric|publisher=[[Microsoft]]|date=2005-10-22|accessdate=2009-05-12}}</ref><ref>[http://blog.ebrahim.org/2006/02/21/server-name-indication-sni/ Server Name Indication (SNI)]</ref><ref>{{cite web | url = https://bugzilla.mozilla.org/show_bug.cgi?id=116169 | title = Browser support for TLS server name indication | accessdate = 2010-12-15 | last = Pierre | first = Julien | format = 2001-12-19 | work = Bugzilla | publisher = Mozilla Foundation}}</ref>


如果[[Mac OS X]]中的家长控制被启用,那么HTTPS站点必须显式地在“总是允许”列表中列出。<ref>{{cite web | url = http://support.apple.com/kb/HT2900 | title = Mac OS X v10.5, 10.6: About the Parental Controls Internet content filter | accessdate = 2010-12-15 | last = Pierre | first = Julien | format = 2010-03-30 | work = Support | publisher = Apple, Inc.}}</ref>
如果[[Mac OS X]]中的家长控制被启用,那么HTTPS站点必须显式地在“总是允许”列表中列出。<ref>{{cite web | url = http://support.apple.com/kb/HT2900 | title = Mac OS X v10.5, 10.6: About the Parental Controls Internet content filter | accessdate = 2010-12-15 | last = Pierre | first = Julien | format = 2010-03-30 | work = Support | publisher = Apple, Inc.}}</ref>
第92行: 第92行:
== 历史 ==
== 历史 ==
[[网景]]在1994年创建了HTTPS,并应用在[[网景导航者]]浏览器中。<ref>{{cite book||title=Embedded software|last=Walls|first=Colin|year=2005|pages=344}}</ref>
[[网景]]在1994年创建了HTTPS,并应用在[[网景导航者]]浏览器中。<ref>{{cite book||title=Embedded software|last=Walls|first=Colin|year=2005|pages=344}}</ref>
最初,HTTPS是与[[安全套接层|SSL]]一起使用的;在SSL逐渐演变到[[传输层安全|TLS]]时,HTTPS也由在2000年五月公布的RFC 2818正式确定下来。<ref>{{cite web|url=http://tools.ietf.org/html/rfc2818|title=HTTP Over TLS|author=Rescorla, E|publisher=[[Internet Engineering Task Force]]|accessdate=6 May 2009|date=May 2000}}</ref>
最初,HTTPS是与[[安全套接层|SSL]]一起使用的;在SSL逐渐演变到[[传输层安全|TLS]]时,HTTPS也由在2000年五月公布的RFC 2818正式确定下来。<ref>{{cite web|url=http://tools.ietf.org/html/rfc2818|title=HTTP Over TLS|author=Rescorla, E|publisher=[[Internet Engineering Task Force]]|accessdate=2009-05-06|date=2000-05}}</ref>


== 参见 ==
== 参见 ==