在公共网站上将 p12 转换为 pem 安全吗?
我想将 p12 密钥转换为 pem,以便在 iPhone 的推送通知服务中使用它。
我找到了一个免费的网站 (https://www.sslshopper.com/ssl-converter.html)
我的问题是:
使用公共网站进行此操作是否安全此对话,或者可能会导致一些问题,因为该网站可以访问我的 iPhone 应用程序并向我的用户发送通知?
i want to convert p12 key to pem to use it in a Push notification service for iphone.
i found a website that do that for free (https://www.sslshopper.com/ssl-converter.html)
my question is:
is it safe to use a public website to do this conversation, or it may cause some issue as this website can access my iphone application and send notification for my users?
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)
您的私钥是私人的。通过将私钥发送给第 3 方,第 3 方可以将自己识别为您。如果没有有权访问配置门户的 Apple ID 的用户名和密码,他们将无法获取证书。但是,如果他们以某种方式获得了您的证书,并且他们已经拥有您的私钥,那么他们就拥有完全的控制权。因此,在某种程度上,问题就变成了你是否相信 sslshopper.com 不会滥用你的私钥。
openssl CLI 拥有在受信任(第一方)环境中将密钥对和证书转换为各种格式所需的所有工具。
Your private key is private. By sending the private key to a 3rd party, the 3rd party can identify themselves as you. They won't be able to get a certificate for it without the username and password for the Apple ID that has access to the provisioning portal. But if they in some way get a hold of your certificate, and they already have your private key, they have full control. So in a way it becomes a question of whether or not you trust sslshopper.com to not abuse your private key.
The openssl CLI has all the tools you need to convert keypairs and certs from and to all kinds of formats, in a trusted (1st party) environment.