SSL 인증서 도움말

How do I know my secure certificate is safe from vulnerabilities?

Our Certificate Authority validates the identity of an entity purchasing an SSL certificate. The Certificate Authority does so by validating documentation provided by the requestor. The Certificate Authority then digitally signs the certificate using a hash function.

A hash function, when combined with the certificate, creates a standard length digital signature that should be unique. Three common hash functions are MD5, MD2, and SHA-2. With the MD5 and MD2 functions, individuals with the appropriate knowledge and computing power can recreate another digital signature to match the original. If this happens, an unsuspecting user could unknowingly be redirected to another site.

Most Certificate Authorities realize the weakness in MD5 and MD2 and use the hash function called SHA-2 which, to date, no one has been able to break. As a user, you should be suspect of SSL enabled sites that use MD5 or MD2.

As a further security measure, we do not allow null bytes in common names and manually review all requests containing either "\" or "/" to prevent misuse.

To determine what type of SSL certificate a site is using, see Determining the Type of SSL Certificate a Website is Using .


이 글이 도움되었나요?
피드백을 보내주셔서 감사합니다. 고객 서비스 담당자에게 문의하시려면 지원 전화 번호 또는 위의 채팅 옵션을 이용하시기 바랍니다.
도와드릴 수 있어 기쁩니다! 더 도와 드릴 것이 있나요?
그것 유감스럽습니다. 혼동이 되었던 사항 또는 솔루션이 고객님의 문제를 해결하지 못했던 원인을 알려주세요.