• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Jeanne Boyarsky
  • Ron McLeod
  • Paul Clapham
  • Liutauras Vilda
Sheriffs:
  • paul wheaton
  • Rob Spoor
  • Devaka Cooray
Saloon Keepers:
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Frits Walraven
  • Tim Moores
Bartenders:
  • Mikalai Zaikin

Security question in J2EE exam book

 
Ranch Hand
Posts: 137
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi there,

One of the SCEA book gives the following situation and asks how safe this is to trust the cert:

You find a certificate on an unknown Web site. The certificate signature validates the certificate as issued by a certificate authority using the key installed in the browser you copied from a friend.

Although sounds unsafe, it may very well yield a true certificate. Here is my reasoning, Since we CAN validate the cert. signature using the public key installed in the browser, that means we can use the public key in the browser to decrypt the cert. from this unknown web site. For this cert to be fake, the hacker has to both hack into the unknown web site to place their certificate there (signed by hacker's private key), AND ALSO hack into the site where my friend download his browser from, to place a compromised browser with their public key. This is not likely a situation for hacker to succeed as he has to hack into the exact two locations.

Did I miss anything?
Thanks,
Yan
 
With a little knowledge, a cast iron skillet is non-stick and lasts a lifetime.
reply
    Bookmark Topic Watch Topic
  • New Topic