PKI Flashcards

1
Q

What is the trust anchor?

A

A self signed certificate of a public key that is allowed to sign other certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can you do with a Root of Trust?

A

Establish trust in other entities. using cryptography to enable transfer of trust from one entity to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sections of x509

A

Data and signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Compelled certs

A

CA cert enabling law enforcement to sign other certs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Do trust roots scale? Models?

A

No, two models: oligarchy: weakest link security, not trusting one entity creates unverifiable entities. Monarchy: no one can agree who. Single rot, like bgpsec, dnssec.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HSTS

A

Http strict transport security: only https

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HPKP

A

HTTP public key pinning. Https header with public keys and a report uri

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CRL

A

Certificate revocation list. Updates come in the form of deltas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CAP theorem

A

Consistency, availability, tolerance to partition, pick 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OCSP (stapling)

A

Online certificate status protocol. Web server attaches OCSP report, response can become too large for intemrediate CA’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DANE (+ constraints)

A

DNS-based authentication of named entities. Uses DNSSEC to bind cert, without CA. 3 constraints: CA constraints, cert constraints, or trust anchor assertion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CT (+prove)

A

Certificate transparency, log append only. SCT’s. Prove log is append only using MHT, and prove cert is in log.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Advantages of CT;

A

Fully operational today, no change required to webserver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Disadvantages of CT

A

Mitm still possible, broeser still needs to check logs eventually, malicious log servers, no revocation. Management of list of log servers can introduce a kill-switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does CT work + consequence?

A

Browser only accepts cert if it has SCT’s, verifies that cert was added. Consequence is that any attacks are public knowledge as cert has to be listed in the log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly