自签名证书

使用發行者自己的私鑰簽署的數碼證書

密码学电脑安全中,自签名证书(英语:self-signed certificate)是使用发行者自己的私钥签署的数码证书,在加密功能上等同于经过可信任的证书颁发机构签署的证书[1],但通常并不具备验证网站身份的功能以及可信性[2]

客户端会警示用户不应连接到使用自签名证书的网站。

由于建立自签名证书是无成本而无需认证的[3][4][2],存在用以进行中间人攻击的风险[5],故用户只应在明确知道该证书是属于对方时才信任之。因此,未经过特别设置信任该自签名证书的客户端会警示用户[3][6],提示用户不应该信任对方并应放弃连接[3][2]

部分公认被信赖的自签名证书,即根证书,是信任链的起点[7],会默认被多数客户端信任[4]。当对其他伺服器的连线准备建立时,如果其证书的上游证书被信任,那么该伺服器的证书就会被信任[4]

参考文献

  1. ^ TIBCO Support Portal. support.tibco.com. [2022-05-13]. (原始内容存档于2022-05-15). 
  2. ^ 2.0 2.1 2.2 What is an SSL certificate?. Cloudflare. [2023-04-16]. (原始内容存档于2023-03-15) (英语). 
  3. ^ 3.0 3.1 3.2 The Dangers of Self-Signed Certificates. GlobalSign GMO Internet, Inc. 2020-02-05 [2022-05-13]. (原始内容存档于2022-03-08) (英语). 
  4. ^ 4.0 4.1 4.2 What is a Root Certificate? - DNSimple Help. support.dnsimple.com. [2022-05-13]. (原始内容存档于2022-04-20). 
  5. ^ What is a Self-Signed SSL Certificate?. Sectigo. [2023-04-15]. (原始内容存档于2022-06-03). 
  6. ^ Certificate Not Trusted | View Security Certificate Errors. www.digicert.com. [2022-05-13]. (原始内容存档于2022-05-09). 
  7. ^ RFC 4158. IETF (英语). all of the end entities and relying parties use a single "Root CA" as their trust anchor. If the hierarchy has multiple levels, the Root CA certifies the public keys of intermediate CAs (also known as subordinate CAs). These CAs then certify end entities' (subscribers') public keys or may, in a large PKI, certify other CAs.