<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>TLS on Answer</title>
    <link>https://answer.freetools.me/tags/tls/</link>
    <description>Recent content in TLS on Answer</description>
    <generator>Hugo -- 0.152.2</generator>
    <language>zh-cn</language>
    <lastBuildDate>Wed, 11 Mar 2026 03:33:58 +0800</lastBuildDate>
    <atom:link href="https://answer.freetools.me/tags/tls/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>线程本地存储：编译器、链接器与内核的十五年共舞</title>
      <link>https://answer.freetools.me/%E7%BA%BF%E7%A8%8B%E6%9C%AC%E5%9C%B0%E5%AD%98%E5%82%A8%E7%BC%96%E8%AF%91%E5%99%A8%E9%93%BE%E6%8E%A5%E5%99%A8%E4%B8%8E%E5%86%85%E6%A0%B8%E7%9A%84%E5%8D%81%E4%BA%94%E5%B9%B4%E5%85%B1%E8%88%9E/</link>
      <pubDate>Wed, 11 Mar 2026 03:33:58 +0800</pubDate>
      <guid>https://answer.freetools.me/%E7%BA%BF%E7%A8%8B%E6%9C%AC%E5%9C%B0%E5%AD%98%E5%82%A8%E7%BC%96%E8%AF%91%E5%99%A8%E9%93%BE%E6%8E%A5%E5%99%A8%E4%B8%8E%E5%86%85%E6%A0%B8%E7%9A%84%E5%8D%81%E4%BA%94%E5%B9%B4%E5%85%B1%E8%88%9E/</guid>
      <description>深入解析线程本地存储(TLS)的技术本质：从errno的线程安全实现到ELF TLS的四种模型，从x86段寄存器的历史包袱到现代语言的性能权衡。揭示TLS如何在编译器、链接器、动态链接器、内核与语言运行时之间实现精妙协作。</description>
    </item>
    <item>
      <title>为什么非对称加密比对称加密慢1000倍：从数学原理到混合加密的工程智慧</title>
      <link>https://answer.freetools.me/%E4%B8%BA%E4%BB%80%E4%B9%88%E9%9D%9E%E5%AF%B9%E7%A7%B0%E5%8A%A0%E5%AF%86%E6%AF%94%E5%AF%B9%E7%A7%B0%E5%8A%A0%E5%AF%86%E6%85%A21000%E5%80%8D%E4%BB%8E%E6%95%B0%E5%AD%A6%E5%8E%9F%E7%90%86%E5%88%B0%E6%B7%B7%E5%90%88%E5%8A%A0%E5%AF%86%E7%9A%84%E5%B7%A5%E7%A8%8B%E6%99%BA%E6%85%A7/</link>
      <pubDate>Sat, 07 Mar 2026 05:43:26 +0800</pubDate>
      <guid>https://answer.freetools.me/%E4%B8%BA%E4%BB%80%E4%B9%88%E9%9D%9E%E5%AF%B9%E7%A7%B0%E5%8A%A0%E5%AF%86%E6%AF%94%E5%AF%B9%E7%A7%B0%E5%8A%A0%E5%AF%86%E6%85%A21000%E5%80%8D%E4%BB%8E%E6%95%B0%E5%AD%A6%E5%8E%9F%E7%90%86%E5%88%B0%E6%B7%B7%E5%90%88%E5%8A%A0%E5%AF%86%E7%9A%84%E5%B7%A5%E7%A8%8B%E6%99%BA%E6%85%A7/</guid>
      <description>深入解析对称加密与非对称加密的性能差异根源，从AES的代换-置换网络到RSA的大整数模幂运算，揭示为什么现代密码学采用混合加密方案，以及TLS 1.3如何通过ECDHE实现前向安全性。</description>
    </item>
    <item>
      <title>被吊销的HTTPS证书为何仍然可信？从软失败陷阱到CRLite的二十年技术突围</title>
      <link>https://answer.freetools.me/%E8%A2%AB%E5%90%8A%E9%94%80%E7%9A%84https%E8%AF%81%E4%B9%A6%E4%B8%BA%E4%BD%95%E4%BB%8D%E7%84%B6%E5%8F%AF%E4%BF%A1%E4%BB%8E%E8%BD%AF%E5%A4%B1%E8%B4%A5%E9%99%B7%E9%98%B1%E5%88%B0crlite%E7%9A%84%E4%BA%8C%E5%8D%81%E5%B9%B4%E6%8A%80%E6%9C%AF%E7%AA%81%E5%9B%B4/</link>
      <pubDate>Sat, 07 Mar 2026 04:48:34 +0800</pubDate>
      <guid>https://answer.freetools.me/%E8%A2%AB%E5%90%8A%E9%94%80%E7%9A%84https%E8%AF%81%E4%B9%A6%E4%B8%BA%E4%BD%95%E4%BB%8D%E7%84%B6%E5%8F%AF%E4%BF%A1%E4%BB%8E%E8%BD%AF%E5%A4%B1%E8%B4%A5%E9%99%B7%E9%98%B1%E5%88%B0crlite%E7%9A%84%E4%BA%8C%E5%8D%81%E5%B9%B4%E6%8A%80%E6%9C%AF%E7%AA%81%E5%9B%B4/</guid>
      <description>深入剖析TLS证书撤销机制的结构性困境。从Heartbleed事件后87%易受攻击证书未被撤销的惊人数据出发，揭示CRL和OCSP的设计缺陷、软失败策略的致命漏洞、Chrome CRLSets与Firefox CRLite的技术分歧，以及Let&amp;#39;s Encrypt终结OCSP、证书有效期缩短至47天等最新行业变革。</description>
    </item>
    <item>
      <title>信任链的二十年困局：为何HTTPS安全建立在一百多个单点故障之上</title>
      <link>https://answer.freetools.me/%E4%BF%A1%E4%BB%BB%E9%93%BE%E7%9A%84%E4%BA%8C%E5%8D%81%E5%B9%B4%E5%9B%B0%E5%B1%80%E4%B8%BA%E4%BD%95https%E5%AE%89%E5%85%A8%E5%BB%BA%E7%AB%8B%E5%9C%A8%E4%B8%80%E7%99%BE%E5%A4%9A%E4%B8%AA%E5%8D%95%E7%82%B9%E6%95%85%E9%9A%9C%E4%B9%8B%E4%B8%8A/</link>
      <pubDate>Sat, 07 Mar 2026 03:05:54 +0800</pubDate>
      <guid>https://answer.freetools.me/%E4%BF%A1%E4%BB%BB%E9%93%BE%E7%9A%84%E4%BA%8C%E5%8D%81%E5%B9%B4%E5%9B%B0%E5%B1%80%E4%B8%BA%E4%BD%95https%E5%AE%89%E5%85%A8%E5%BB%BA%E7%AB%8B%E5%9C%A8%E4%B8%80%E7%99%BE%E5%A4%9A%E4%B8%AA%E5%8D%95%E7%82%B9%E6%95%85%E9%9A%9C%E4%B9%8B%E4%B8%8A/</guid>
      <description>深入剖析PKI体系的结构性脆弱性。从DigiNotar事件到证书透明度的演进，揭示数字证书信任链背后的技术困境：为何一百多个证书授权机构意味着一百多个攻击面，为何证书吊销机制形同虚设，以及Web PKI如何在不断修补中艰难前行。</description>
    </item>
    <item>
      <title>TLS握手为何需要两轮往返：从协议设计到性能优化的十年演进</title>
      <link>https://answer.freetools.me/tls%E6%8F%A1%E6%89%8B%E4%B8%BA%E4%BD%95%E9%9C%80%E8%A6%81%E4%B8%A4%E8%BD%AE%E5%BE%80%E8%BF%94%E4%BB%8E%E5%8D%8F%E8%AE%AE%E8%AE%BE%E8%AE%A1%E5%88%B0%E6%80%A7%E8%83%BD%E4%BC%98%E5%8C%96%E7%9A%84%E5%8D%81%E5%B9%B4%E6%BC%94%E8%BF%9B/</link>
      <pubDate>Fri, 06 Mar 2026 01:57:21 +0800</pubDate>
      <guid>https://answer.freetools.me/tls%E6%8F%A1%E6%89%8B%E4%B8%BA%E4%BD%95%E9%9C%80%E8%A6%81%E4%B8%A4%E8%BD%AE%E5%BE%80%E8%BF%94%E4%BB%8E%E5%8D%8F%E8%AE%AE%E8%AE%BE%E8%AE%A1%E5%88%B0%E6%80%A7%E8%83%BD%E4%BC%98%E5%8C%96%E7%9A%84%E5%8D%81%E5%B9%B4%E6%BC%94%E8%BF%9B/</guid>
      <description>从TLS 1.2的2-RTT握手到TLS 1.3的1-RTT乃至0-RTT，深入解析传输层安全协议的性能演进。文章剖析TLS 1.2握手需要两轮往返的根本原因——客户端必须等待服务器证书才能开始密钥协商；揭示TLS 1.3如何通过在ClientHello中预置Diffie-Hellman共享值，将密钥交换提前到第一轮往返完成；以及0-RTT会话恢复背后的安全权衡与重放攻击风险。这是现代网络性能优化不可绕过的核心技术。</description>
    </item>
  </channel>
</rss>
