Date: Mon, 14 Dec 2020 00:07:57 GMT
<p>When the private key of a matching public key that belong to a certificate is leaked, an attacker can intercept server hello, use their own dh parameters sign it with the stolen private key and ship it to the client effectively doing MITM. This is extremely dangerous and we have no way in the client to know a MITM has happened.</p> <p>That is why a certificate sometimes has to be revoked, and in this video I’m going to discuss those revocation techniques.</p> <p>0:00 How Certificate Works</p> <p>3:00 Certificate Revocation List</p> <p>4:10 OCSP</p> <p>7:00 OCSP Stapling</p>