Answer the question
In order to leave comments, you need to log in
What can an attacker do if he gets a server SSL certificate?
Recently, the technical specialists of the service, with whose API we integrated,
mistakenly threw us the "server certificate.cer"
(we requested certificates to connect to them according to GOST TLS)
In the certificate, I see the lines
X509v3 Key Usage:
Digital Signature, Non Repudiation, Key Encipherment, Data Encipherment
Answer the question
In order to leave comments, you need to log in
"cer" is the certificate. It can and should be shared with everyone. There is nothing secret there.
You can't give "pvk" and/or "pfx" to outsiders - it contains the private key.
If you get a real full-fledged .p12 with a known password, or even *.crt and *.key that are not password-protected, you can impersonate the owner of the certificate and not a single dog will prove that it is not him.
But you have come across something that is distributed to everyone completely free of charge, such as a leaflet - a shared key (public certificate) in DER format. Key Usage practically does not matter, Extended Key Usage could be interesting - this is where its real applicability is usually listed.
So you can admire it. And all :)
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question