How Does SSL Protect Against IP Spoofing?
Establishing a Connection When a browser accesses an SSL-protected website, the browser automatically sends a request to the server, asking for the SSL Public Key. The browser processes this Public Key and sends a reply back to the server, which then compares this result to an SSL Hidden Key on the server. As long as these values match, then the web browser allows the user to continue to access the website without warning. This connection procedure is called a “handshake” and happens nearly instantly whenever a website is accessed. It is totally invisible to the user. IP-Based Spoofing Protection An SSL certificate is specific to the particular domain for which it was created, regardless of the IP address of that domain. So, if a malicious entity were to attempt to redirect traffic for a certain website to their own malicious site through IP spoofing techniques, the fake site would not have an SSL certificate that was accurately registered to the real website. This can be verified thro