Установка сертификатов для ОС Android/en: различия между версиями
(Новая страница: «=== '''Necessity''' === The use of self-signed certificates is most commonly used for: '''Application Testing''' <br> Developers often use self-signed certificates for testing applications before their publication. This allows them to create a secure connection, for example, between the application and the server, without the need to purchase a certificate from a certification authority. '''Internal Use'''<br> In some companies, self-signed certificates are...») |
(Новая страница: «== '''Possible Interactions with Certificates''' == === '''Creating Certificates''' === For the procedure to create a self-signed certificate, refer to the separate instruction: Creating Self-Signed SSL Certificates Using the OpenSSL Tool on Ubuntu === '''Adding Certificates''' === If a user needs a certificate for an application to work, they can install it themselves manually. The created certificate will confirm that the application is allowed access...») |
||
Строка 20: | Строка 20: | ||
The use of self-signed certificates can increase the risk of attacks such as "man-in-the-middle" (MITM), where a malefactor can intercept data between two parties. | The use of self-signed certificates can increase the risk of attacks such as "man-in-the-middle" (MITM), where a malefactor can intercept data between two parties. | ||
{{Note|MITM is a "man-in-the-middle" attack — a cyber attack in which a cybercriminal intercepts data being sent between two organizations or people. The purpose of the interception is to steal, eavesdrop, or alter data for some malicious purpose, such as extortion.|warn}} | {{Note|MITM is a "man-in-the-middle" attack — a cyber attack in which a cybercriminal intercepts data being sent between two organizations or people. The purpose of the interception is to steal, eavesdrop, or alter data for some malicious purpose, such as extortion.|warn}} | ||
== '''Possible Interactions with Certificates''' == | |||
== ''' | === '''Creating Certificates''' === | ||
=== ''' | For the procedure to create a self-signed certificate, refer to the separate instruction: [[Creating Self-Signed SSL Certificates Using the OpenSSL Tool on Ubuntu]] | ||
=== '''Adding Certificates''' === | |||
=== ''' | If a user needs a certificate for an application to work, they can install it themselves manually. The created certificate will confirm that the application is allowed access to specific functions and data. | ||
{{Note|The algorithm described below is relevant for devices running Android OS 9 and higher.|warn}} | |||
{{Note| | ==== '''Certificate Installation Algorithm''' ==== | ||
==== ''' | |||
# | # Open "Settings" on the device. | ||
# | # Go to: "Security and Privacy" > "Additional Security Settings" > "Encryption and Credentials". | ||
# | # Next, choose "Install Certificates" > "WI-FI Certificate". | ||
# | # Find and click on the menu icon, represented by three horizontal lines. | ||
# | # Select the location where the certificate was saved. | ||
# | # Click on the file. You may need to enter a password for the key storage and then click "OK". | ||
# | # Enter the name of the certificate. | ||
# | # Click "OK" | ||
<div lang="ru" dir="ltr" class="mw-content-ltr"> | <div lang="ru" dir="ltr" class="mw-content-ltr"> | ||
=== '''Удаление сертификатов''' === | === '''Удаление сертификатов''' === |
Версия от 16:33, 23 ноября 2023
Self-Signed Certificates
Users have a need to add self-signed certificates for Android OS.
This process is relatively simple, but it also has its own features and nuances.
General Information
Terminology
A self-signed certificate is a digital certificate that is not issued or verified by a third party, such as a Certificate Authority (CA). Instead, it is created and signed by the user or organization that uses it.
Simply put, it is a certificate created by the user or organization that uses it.
Necessity
The use of self-signed certificates is most commonly used for:
Application Testing
Developers often use self-signed certificates for testing applications before their publication. This allows them to create a secure connection, for example, between the application and the server, without the need to purchase a certificate from a certification authority.
Internal Use
In some companies, self-signed certificates are used within internal networks to encrypt data and ensure security.
Risks and Limitations
The use of self-signed certificates carries certain risks and difficulties in their use. Key risks include:
- System distrust.
Since self-signed certificates are not verified and not issued by certification authorities, they often trigger security warnings in browsers and applications. This can alarm users.
- Vulnerability of each certificate.
The use of self-signed certificates can increase the risk of attacks such as "man-in-the-middle" (MITM), where a malefactor can intercept data between two parties.
Possible Interactions with Certificates
Creating Certificates
For the procedure to create a self-signed certificate, refer to the separate instruction: Creating Self-Signed SSL Certificates Using the OpenSSL Tool on Ubuntu
Adding Certificates
If a user needs a certificate for an application to work, they can install it themselves manually. The created certificate will confirm that the application is allowed access to specific functions and data.
Certificate Installation Algorithm
- Open "Settings" on the device.
- Go to: "Security and Privacy" > "Additional Security Settings" > "Encryption and Credentials".
- Next, choose "Install Certificates" > "WI-FI Certificate".
- Find and click on the menu icon, represented by three horizontal lines.
- Select the location where the certificate was saved.
- Click on the file. You may need to enter a password for the key storage and then click "OK".
- Enter the name of the certificate.
- Click "OK"
Удаление сертификатов
Каждый пользователь может удалить самоподписанный сертификат, найдя его в списке сертификатов. Для этого необходимо:
- Открыть приложение "Настройки".
- Нажать: "Безопасность и конфиденциальность" > "Дополнительные настройки безопасности" "Шифрование и учетные данные".
- Необходимо перейти в раздел "Хранилище учетных данных".
Таким образом попав в хранилище сертификатов, можно делать уже следующие действия с ними:
- (Не рекомендуется) Для удаления всех сертификатов на устройстве необходимо нажать "Очистить все учетные данные" > "ОК".
- (Рекомендуется) Для удаление конкретных сертификатов на устройстве необходимо нажать "Учетные данные пользователя" > выбрать нужные учетные данные для удаления.
Примечания
Использование сети WI-FI, защищенную WPA-Enterprise. Можно при подключении использовать настройки WPA/WPA2/WPA3-Enterprise для дополнительной защиты. Чтобы это сделать, нужно:
- Открыть приложение "Настройки".
- Нажать на раздел "Сеть и интернет" > "Интернет" > "Добавить сеть ", с помощью иконки "+"
- Ввести данные, полученные у администратора сети.
Настройки "Не проверять".
Сохраненные настройки Enterprise, которые отключают проверку подлинности сертификата сервера, не затрагиваются. Однако вы не можете изменять их и создавать новые.
Настройки WPA/WPA2/WPA3-Enterprise доступны как пользователям частным лицам, так пользователям сотрудникам организаций.
Тонкости и нюансы
Проработка проблемы с коллизией между сервером и клиентом.
В данном случае необходимо вводить доменное имя не в полном формате, а с использованием "*".
"abcdef.technomedia.ru"- неправильно
"*.technomedia.ru"- правильно
Итоговый результат
Пользователи умеют создавать и взаимодействовать с самоподписанными сертификатами.