Lesson 6 Flashcards
PKI
• Public key infrastructure (PKI) validates the identity of the owner of a public
key
• Public key is wrapped in a digital certificate signed by a certificate authority
(CA)
• Sender and recipient must both trust the CA
Single CA
In this simple model, a single CA issues certificates to users; users trust certificates
issued by that CA and no other.
The problem with this approach is that the single CA
server is very exposed. If it is compromised, the whole PKI collapses.
• Hierarchical/chain of trust
Root CA (or Single CA)
• Intermediate CAs
• Leaf certificates
The Root CA is still the single point of failure. If the root is damaged or compromised, the whole structure collapses.
To mitigate against this, however, the root server can be taken offline, as most of the
regular CA activities are handled by the intermediate CA servers.
Registration
Registration is the process by which end users create an account with the CA and
become authorized to request certificates. The exact processes by which users are
authorized and their identity proven are determined by the CA implementation.
CSR
- Client generates key pair and sends public key to CA with CSR
- CA performs subject identity checks
- CA signs and issues certificate
REgistration Authority (RA)
The registration function may be delegated by the CA to one or more registration
authorities (RAs). These entities complete identity checking and submit CSRs on
behalf of end users, but they do not actually sign or issue certificates.
Digital Certificate
•Essentially a wapper for the subject’s public key
Contains subject’s public key
• Information identifying the subject
plus usage and validity
• Digital certificate standards • X.509 Public Key Infrastructure (PKIX) • PKCS (Public Key Cryptography Standards)
Digital Certificate Dandards
• Digital certificate standards • X.509 Public Key Infrastructure (PKIX) • PKCS (Public Key Cryptography Standards)
x.509 standard fields
Field Usage - Serial Number A number uniquely identifying the certificate within the domain of its CA.
Signature Algorithm - The algorithm used by the CA to sign the certificate.
Issuer The name of the CA.
Valid From/To Date and time during which the certificate is valid.
Subject The name of the certificate holder, expressed as a distinguished name (DN). Within this, the Common Name (CN) part should usually match either the
fully qualified domain name (FQDN) of the server or a user email address.
Public Key Public key and algorithm used by the certificate holder.
Extensions V3 certificates can be defined with extended attributes, such as friendly
subject or issuer names, contact email addresses, and intended key usage.
Subject Alternative Name (SAN) - This extension field is the preferred mechanism to identify the DNS name or
names by which a host is identified
• Common Name (CN)
• Legacy method of recording FQDN (fully qualified domain name
• Deprecated by standards
• BUT still used in many
implementations
• Subject Alternative Name (SAN)
non legacy (Common Name (CS)) is legacy
- Structured identifiers
- List multiple host/subdomains
- Use wildcard subdomain
Types of Certificate
- Certificate policicies and templates
- key usage
- Extended Key Usage/Enhanced Key Usage
- Critical or non critical
server certificate
guarantees the identity of e-commerce sites or any sort of website
to which users submit data that should be kept confidential.
Web server Certificate types
- Domain Validation (DV)
- More rigorous identity checks
• Extended Validation (EV)
• Even more rigorous identity
checks
• Machine/computer certificates
- Servers and network appliances
- Identify by FQDN
It might be necessary to issue certificates to machines (servers, PCs, smartphones, and
tablets), regardless of function. For example, in an Active Directory domain, machine
certificates could be issued to Domain Controllers, member servers, or even client
workstations. Machines without valid domain-issued certificates could be prevented
from accessing network resources. Machine certificates might be issued to network
appliances, such as routers, switches, and firewalls. The SAN and often the CN attribute
should be set to the FQDN of the machine (host name and local domain part).