admin管理员组文章数量:1401407
I believe I already know the answer to this but I wanted to see if anyone had more insight into this problem. I have done certificate pinning in Android and iOS applications to make them more secure against man in the middle attacks. I am curious, can this same thing be done on a website which executes Ajax calls? I'm thinking not as the Javascript code could be modified during transport, has anyone had any experience with this?
I believe I already know the answer to this but I wanted to see if anyone had more insight into this problem. I have done certificate pinning in Android and iOS applications to make them more secure against man in the middle attacks. I am curious, can this same thing be done on a website which executes Ajax calls? I'm thinking not as the Javascript code could be modified during transport, has anyone had any experience with this?
Share Improve this question asked Apr 1, 2016 at 14:24 Bobbake4Bobbake4 24.9k9 gold badges63 silver badges98 bronze badges1 Answer
Reset to default 6You might be interested in this: http://caniuse./#search=HPKP . Modern browsers already have support for public key pinning.
Also great article about preventing man in the middle attacks (or them making harder to pull off - as it seems "preventing" in a security context has a relative meaning): http://blog.scottlogic./2016/02/01/man-in-the-middle.html
And if you're feeling adventurous you can go really low level with a native implementation of TLS in JavaScript: https://github./digitalbazaar/forge/blob/master/README.md
本文标签: javascriptCertificate pinning in Ajax callsStack Overflow
版权声明:本文标题:javascript - Certificate pinning in Ajax calls - Stack Overflow 内容由网友自发贡献,该文观点仅代表作者本人, 转载请联系作者并注明出处:http://www.betaflare.com/web/1744283609a2598773.html, 本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌抄袭侵权/违法违规的内容,一经查实,本站将立刻删除。
发表评论