<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>协议安全 on Answer</title>
    <link>https://answer.freetools.me/tags/%E5%8D%8F%E8%AE%AE%E5%AE%89%E5%85%A8/</link>
    <description>Recent content in 协议安全 on Answer</description>
    <generator>Hugo -- 0.152.2</generator>
    <language>zh-cn</language>
    <lastBuildDate>Sat, 21 Mar 2026 03:38:37 +0800</lastBuildDate>
    <atom:link href="https://answer.freetools.me/tags/%E5%8D%8F%E8%AE%AE%E5%AE%89%E5%85%A8/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>智能家居协议的协议栈博弈：从IEEE 802.15.4到Matter的四十年技术演进</title>
      <link>https://answer.freetools.me/%E6%99%BA%E8%83%BD%E5%AE%B6%E5%B1%85%E5%8D%8F%E8%AE%AE%E7%9A%84%E5%8D%8F%E8%AE%AE%E6%A0%88%E5%8D%9A%E5%BC%88%E4%BB%8Eieee-802.15.4%E5%88%B0matter%E7%9A%84%E5%9B%9B%E5%8D%81%E5%B9%B4%E6%8A%80%E6%9C%AF%E6%BC%94%E8%BF%9B/</link>
      <pubDate>Sat, 21 Mar 2026 03:38:37 +0800</pubDate>
      <guid>https://answer.freetools.me/%E6%99%BA%E8%83%BD%E5%AE%B6%E5%B1%85%E5%8D%8F%E8%AE%AE%E7%9A%84%E5%8D%8F%E8%AE%AE%E6%A0%88%E5%8D%9A%E5%BC%88%E4%BB%8Eieee-802.15.4%E5%88%B0matter%E7%9A%84%E5%9B%9B%E5%8D%81%E5%B9%B4%E6%8A%80%E6%9C%AF%E6%BC%94%E8%BF%9B/</guid>
      <description>深入解析智能家居四大协议（Zigbee、Thread、Matter、Z-Wave）的技术架构设计哲学、协议栈实现细节、安全机制对比以及实际部署考量。从IEEE 802.15.4基础标准出发，探讨各协议在路由算法、功耗优化、频段选择等工程维度的权衡决策。</description>
    </item>
    <item>
      <title>DNS缓存投毒为何能在二十年间反复复活：从Kaminsky到SAD DNS的技术博弈</title>
      <link>https://answer.freetools.me/dns%E7%BC%93%E5%AD%98%E6%8A%95%E6%AF%92%E4%B8%BA%E4%BD%95%E8%83%BD%E5%9C%A8%E4%BA%8C%E5%8D%81%E5%B9%B4%E9%97%B4%E5%8F%8D%E5%A4%8D%E5%A4%8D%E6%B4%BB%E4%BB%8Ekaminsky%E5%88%B0sad-dns%E7%9A%84%E6%8A%80%E6%9C%AF%E5%8D%9A%E5%BC%88/</link>
      <pubDate>Sat, 07 Mar 2026 04:42:36 +0800</pubDate>
      <guid>https://answer.freetools.me/dns%E7%BC%93%E5%AD%98%E6%8A%95%E6%AF%92%E4%B8%BA%E4%BD%95%E8%83%BD%E5%9C%A8%E4%BA%8C%E5%8D%81%E5%B9%B4%E9%97%B4%E5%8F%8D%E5%A4%8D%E5%A4%8D%E6%B4%BB%E4%BB%8Ekaminsky%E5%88%B0sad-dns%E7%9A%84%E6%8A%80%E6%9C%AF%E5%8D%9A%E5%BC%88/</guid>
      <description>深入解析DNS缓存投毒攻击的技术本质，从2008年Kaminsky漏洞到2020年SAD DNS攻击、2023年MaginotDNS，再到2025年CVE-2025-40778，揭示这场持续二十年的攻防博弈背后的协议缺陷、防御措施与突破手段。</description>
    </item>
    <item>
      <title>零往返的代价：HTTP/3 0-RTT 为何成为开发者必须正视的安全陷阱</title>
      <link>https://answer.freetools.me/%E9%9B%B6%E5%BE%80%E8%BF%94%E7%9A%84%E4%BB%A3%E4%BB%B7http/3-0-rtt-%E4%B8%BA%E4%BD%95%E6%88%90%E4%B8%BA%E5%BC%80%E5%8F%91%E8%80%85%E5%BF%85%E9%A1%BB%E6%AD%A3%E8%A7%86%E7%9A%84%E5%AE%89%E5%85%A8%E9%99%B7%E9%98%B1/</link>
      <pubDate>Fri, 06 Mar 2026 13:59:57 +0800</pubDate>
      <guid>https://answer.freetools.me/%E9%9B%B6%E5%BE%80%E8%BF%94%E7%9A%84%E4%BB%A3%E4%BB%B7http/3-0-rtt-%E4%B8%BA%E4%BD%95%E6%88%90%E4%B8%BA%E5%BC%80%E5%8F%91%E8%80%85%E5%BF%85%E9%A1%BB%E6%AD%A3%E8%A7%86%E7%9A%84%E5%AE%89%E5%85%A8%E9%99%B7%E9%98%B1/</guid>
      <description>从TLS 1.3的设计困境出发，深度剖析HTTP/3 0-RTT连接重用的安全漏洞。文章基于RFC 8446、RFC 8470、RFC 9001、RFC 9114等官方规范，以及USENIX Security、EuroS&amp;amp;P等顶级会议论文，系统解析0-RTT重放攻击的技术原理、实际威胁场景与防御机制。涵盖Cloudflare的保守策略、425状态码的设计初衷、以及开发者需要遵循的最佳实践。</description>
    </item>
  </channel>
</rss>
