Ch13 - 13.01 - Introduction to Public Key Infrastructure Flashcards
Review Ch12 - Key Points
As you also learned in the previous chapter, the recipient’s public key is used to encrypt a message, while the sender’s private key is used to digitally sign the message and prove who the sender of the message is (known as nonrepudiation).
Certificates
A certificate is an electronic file that is used to store the public key (and sometimes the private key) and associates the public key with an entity such as a person or company. For example, if you are hosting a web site and wish to secure the communication, you need to configure the web server with a public key. You obtain a certificate (which contains the public key) and assign it to the web server in order to encrypt the communication.
Certificates - Subject Attribute
Take special notice that the Subject attribute is set to www.certworld.loc. This is sometimes referred to as the common name of the certificate, and it should match the URL that users access for the application that uses the certificate
Certificate Types
- Wildcard
- Subject Alternative Name (SAN)
- Code Signing
- Self-signed
- Machine/computer
- User
- Root
- Domain Validation
- Extended Validation
Certificate Types - Wildcard
Certificates are assigned a common name when created,
and the common name matches the URL of the site or entity using the certificate. A wildcard certificate is a special certificate that can be applied to many URLs within the domain. For example, I could have a wildcard certificate of *.gleneclarke.com and it could be used on
servers such as:
www.gleneclarke.com,
mail.gleneclarke.com, and
login.gleneclarke.com.
Certificate Types - Subject Alternative Name (SAN)
A subject alternative name (SAN) certificate is a certificate that can have multiple common names associated with the certificate. This is useful when the server runs multiple services and therefore will use multiple names. For example, I could have a SAN certificate for my Exchange server that holds the names mail.gleneclarke.com and autodiscover.gleneclarke.com. Without the use of a SAN certificate, I would need to purchase multiple single common name certificates.
Certificate Types - Code Signing
A code-signing certificate would be used to digitally
sign application code that you create. When you sign the application code, you are digitally stamping the code to indicate where the code came from. Digitally signing the code also includes in the signature a message digest that is used to detect if someone alters the code.
Certificate Types - Self-signed
A self-signed certificate is used by the root CA. Each
entity within the PKI needs a certificate. The root CA creates its own certificate (which is why it is called self-signed), while all other systems and users will obtain a certificate from the CA.
Certificate Types - Machine/computer
A company may want to encrypt the communication between computers on the network. For example, a company may want to encrypt communication between its servers. In order to do this, each computer needs a machine (aka computer) certificate applied to it.
Certificate Types - E-mail
An e-mail certificate is used to encrypt e-mail messages with the S/MIME protocol. The e-mail client software would need to be configured to use the certificate so that the e-mail messages are encrypted.
Certificate Types - User
Just as a machine certificate is used by the computer, a user certificate is used by the user of the system to encrypt different types of information. For example, a user certificate can be used to encrypt data on disk with Microsoft’s Encrypting File System (EFS).
Certificate Types - Root
When a PKI is created, the first certificate authority installed is known as the root CA. The root CA has a self-signed certificate that it uses to digitally sign every other certificate the CA creates. The certificate used by the root CA is known as the root certificate.
Certificate Types - Domain Validation
A domain validation certificate, also known as a domain-validated certificate, is a certificate used for SSL/TLS where the request for the certificate is validated against the registered domain information. As part of the validation process, when you (as the administrator) request the certificate from the CA, the CA sends an email message to the administrator e-mail address associated with the domain. By replying to the e-mail from the CA, you prove you are the administrator of the domain and can receive the certificate.
Certificate Types - Extended Validation
An extended validation certificate builds off the domain validation certificate by not only verifying the domain but also checking the organization information filled in with the certificate request (this part of the validation is actually called organization validation). The extended validation does all that, plus it also validates that the organization is a legal entity.
Certificate Formats
- DER/CER (.der, .cer)
- PEM (.pem, .crt, .cer, .key)
- PFX/P12 (.pfx, .p12)
- P7B (.p7b, .p7c)
Also note that if exporting a certificate to include a private key, you use a .pfx file, but if you are exporting just the public key, you can use a .cer file.