<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>中间人攻击 on Answer</title>
    <link>https://answer.freetools.me/tags/%E4%B8%AD%E9%97%B4%E4%BA%BA%E6%94%BB%E5%87%BB/</link>
    <description>Recent content in 中间人攻击 on Answer</description>
    <generator>Hugo -- 0.152.2</generator>
    <language>zh-cn</language>
    <lastBuildDate>Thu, 05 Mar 2026 15:31:43 +0800</lastBuildDate>
    <atom:link href="https://answer.freetools.me/tags/%E4%B8%AD%E9%97%B4%E4%BA%BA%E6%94%BB%E5%87%BB/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>DNS 缺乏身份验证的后果：为什么三十年前设计的协议至今仍在制造安全危机</title>
      <link>https://answer.freetools.me/dns-%E7%BC%BA%E4%B9%8F%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%9A%84%E5%90%8E%E6%9E%9C%E4%B8%BA%E4%BB%80%E4%B9%88%E4%B8%89%E5%8D%81%E5%B9%B4%E5%89%8D%E8%AE%BE%E8%AE%A1%E7%9A%84%E5%8D%8F%E8%AE%AE%E8%87%B3%E4%BB%8A%E4%BB%8D%E5%9C%A8%E5%88%B6%E9%80%A0%E5%AE%89%E5%85%A8%E5%8D%B1%E6%9C%BA/</link>
      <pubDate>Thu, 05 Mar 2026 15:31:43 +0800</pubDate>
      <guid>https://answer.freetools.me/dns-%E7%BC%BA%E4%B9%8F%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%9A%84%E5%90%8E%E6%9E%9C%E4%B8%BA%E4%BB%80%E4%B9%88%E4%B8%89%E5%8D%81%E5%B9%B4%E5%89%8D%E8%AE%BE%E8%AE%A1%E7%9A%84%E5%8D%8F%E8%AE%AE%E8%87%B3%E4%BB%8A%E4%BB%8D%E5%9C%A8%E5%88%B6%E9%80%A0%E5%AE%89%E5%85%A8%E5%8D%B1%E6%9C%BA/</guid>
      <description>从1983年DNS诞生到2020年SAD DNS攻击，互联网域名系统从未被设计为验证响应的真实性。本文深入剖析DNS缓存投毒、Sea Turtle国家级DNS劫持、DNS放大攻击等威胁的技术原理，详细解析DNSSEC如何通过链式信任和数字签名解决身份验证问题，以及为什么这一安全机制在部署三十年后仍只有不到6%的域名采用。</description>
    </item>
  </channel>
</rss>
