How to enable https two-way authentication
1. Http
HyperText Transfer Protocol, Hypertext Transfer Protocol, is the most widely used one on the Internet. A protocol, a standard that all WWW files must follow. The data transmitted by the HTTP protocol is unencrypted, that is, in clear text, so it is very unsafe to use the HTTP protocol to transmit private information.
The TCP port used is: 80
2. Https
Hyper Text Transfer Protocol over Secure Socket Layer, secure hypertext transfer protocol, network Jingfu designed the SSL (Secure Sockets Layer) protocol to encrypt data transmitted by the HTTP protocol to ensure security during the session.
The default TCP port used is 443
3. SSL protocol encryption method
The SSL protocol uses both symmetric encryption and asymmetric encryption ( Public key encryption), when establishing a transmission link, SSL first uses the public key for asymmetric encryption of the symmetric encryption key. After the link is established, SSL uses symmetric encryption for the transmission content.
Symmetric encryption
High speed, large encrypted content, used to encrypt messages during the session
Public key encryption
Slow encryption speed , but it can provide better identity authentication technology, used to encrypt the key of symmetric encryption
Related recommendations: "FAQ"
4. Two-way Authentication
The principles of two-way authentication and one-way authentication are basically the same, except that in addition to the client needing to authenticate the server, the server authenticates the client. The specific process is as follows:
1. The client sends the SSL protocol version number, encryption algorithm type, random number and other information to the server.
2. The server returns the SSL protocol version number, encryption algorithm type, random number and other information to the client. It also returns the server-side certificate, that is, the public key certificate.
3. The client uses the information returned by the server to verify the legitimacy of the server, including:
(1) Whether the certificate has expired.
(2) Whether the CA issuing the server certificate is reliable.
(3) Whether the returned public key can correctly decrypt the digital signature in the returned certificate.
(4) Whether the domain name on the server certificate matches the actual domain name of the server.
(5) After the verification is passed, communication will continue, otherwise, communication will be terminated.
4. The server requires the client to send the client's certificate, and the client will send its own certificate to the server.
5. Verify the client's certificate. After passing the verification, the client's public key will be obtained.
6. The client sends the symmetric encryption scheme it can support to the server for the server to choose.
7. The server selects the encryption method with the highest degree of encryption among the encryption schemes provided by the client.
8. Encrypt the encryption scheme using the public key obtained previously and return it to the client.
9. After receiving the encryption scheme ciphertext returned by the server, the client uses its own private key to decrypt to obtain the specific encryption method, and then generates a random code for the encryption method, which is used in the encryption process. The key is encrypted using the public key previously obtained from the server certificate, and then sent to the server.
10. After the server receives the message sent by the client, it uses its own private key to decrypt it and obtains the symmetric encryption key. In the subsequent session, the server and client will use this password. Perform symmetric encryption to ensure the security of information during communication.
The above is the detailed content of How to enable https two-way authentication. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

How to use NginxProxyManager to implement automatic jump from HTTP to HTTPS. With the development of the Internet, more and more websites are beginning to use the HTTPS protocol to encrypt data transmission to improve data security and user privacy protection. Since the HTTPS protocol requires the support of an SSL certificate, certain technical support is required when deploying the HTTPS protocol. Nginx is a powerful and commonly used HTTP server and reverse proxy server, and NginxProxy

How to use NginxProxyManager to implement reverse proxy under HTTPS protocol. In recent years, with the popularity of the Internet and the diversification of application scenarios, the access methods of websites and applications have become more and more complex. In order to improve website access efficiency and security, many websites have begun to use reverse proxies to handle user requests. The reverse proxy for the HTTPS protocol plays an important role in protecting user privacy and ensuring communication security. This article will introduce how to use NginxProxy

Nginx is a high-performance web server software and a powerful reverse proxy server and load balancer. With the rapid development of the Internet, more and more websites are beginning to use the SSL protocol to protect sensitive user data, and Nginx also provides powerful SSL support, making the security performance of the web server even further. This article will introduce how to configure Nginx to support the SSL protocol and protect the security performance of the web server. What is SSL protocol? SSL (SecureSocket

The https workflow includes steps such as client-initiated request, server response, SSL/TLS handshake, data transmission, and client-side rendering. Through these steps, the security and integrity of data during transmission can be ensured.

In today's Internet era, secure communication has become an indispensable part. Especially in HTTPS communication, how to ensure its security is particularly important. As a popular web server and reverse proxy server, Nginx's firewall can also play an important role in ensuring HTTPS secure communication. This article will discuss the Nginx firewall from the following aspects. TLS/SSL encryption The security of HTTPS communication is mainly based on TLS/SSL encryption technology, which can prevent data from being transmitted during transmission.

Configuration steps: 1. Obtain the SSL certificate; 2. Configure the SSL certificate; 3. Edit the Tomcat configuration file; 4. Restart Tomcat. Detailed introduction: 1. You need to obtain an SSL certificate, either a self-signed certificate or a valid SSL certificate from a certification agency (such as Let's Encrypt); 2. Place the obtained SSL certificate and private key files on the server and ensure that these files Located in a safe location, only users with sufficient permissions can access; 3. Edit Tomcat configuration files, etc.

The reason for the error is that the ProxySchemeUnknown(proxy.scheme) error of urllib3 is usually caused by the use of an unsupported proxy protocol. In this case, urllib3 does not recognize the proxy server's protocol type and therefore cannot use the proxy for network connections. To resolve this issue, you need to ensure that you are using a supported proxy protocol, such as HTTP or https. How to resolve To resolve this issue, you need to ensure that you are using a supported proxy protocol, such as HTTP or HTTPS. You can solve this problem by setting the proxy parameters of urllib3. If you are using an http proxy, the code example is as follows: importurllib3http

The difference between one-way verification and two-way verification: One-way verification: refers to the client verifying the server-side certificate, and the server does not need to verify the client certificate. Two-way verification: refers to the client verifying the server-side certificate, and the server also needs to verify the client certificate through the CA's public key certificate. Detailed handshake process: One-way authentication The browser sends a connection request to the security server. 1. The server sends its own certificate and certificate-related information to the client browser. 2. The client browser checks whether the certificate sent by the server is issued by the CA center it trusts. If it is, continue to execute the agreement; if not, the client's browser will give the client a warning message: warning the client that this certificate is not trustworthy and asking the client if it needs to continue. 3. Pick up customers