PKI Concepts Flashcards
Certificate Hierarchy
is the ultimate authority as it holds the master key, also
known as the root key, for signing all of the certificates that it gives to the Intermediary
who issues the certificate to the requester
Online CA
An internal online CA is always up and running so that people in the
company can request a certificate at any time of the day or night. This would not be
the case in a government or top-security environment.
Offline CA
An offline CA is for a military or secure environment where clearance
and vetting must be completed before someone can be issued with a certificate. The
CA is kept offline and locked up when it is not being used. It is switched off so that
it cannot issue new certificates.
Public CA
also known as a third-party CA and is commercially
accepted as an authority for issuing public certificates.
Certificate Revocation List (CRL)
This is the first stage in checking whether a
certificate is valid. If the certificate is not valid, it will be entered into the CRL. If the
X509 is in the CRL, it is no longer valid and will not be accepted. No matter how
obscure the question posed in the exam, unless it is going slow or you are looking
for a faster lookup, it will be the CRL that provides certificate validity. No matter the
scenario, the CRL, is the default.
Certificate Pinning TIP
Certificate pinning prevents the compromising of the CA
and the issuing of fraudulent X509 certificates. It prevents SSL man-in-themiddle attacks.
Trust Anchor
A trust anchor in a PKI environment is the root certificate from
which the whole chain of trust is derived; this is the root CA
Trust Model
A trust model proves the authenticity of a certificate; there are two
trust models
Hierarchical Trust Model
This uses a hierarchy from the root CA down to the
intermediary (also known as a subordinate); this is the normal PKI model
Bridge Trust Model
The bridge trust model is peer-to-peer, where two separate
PKI environments trust each other. The certificate authorities communicate with
each other, allowing for cross-certification
Certificate Chaining TIP
This chain of trust is used to verify who the Certificate
Authority is. The chain normally has three layers, the certificate vendor, the vendor’s
CA, and the computer where the certificate is installed
Online Certificate Status Protocol (OCSP)
Only when the CRL is going slow will
the OCSP come into play. It is much faster than the CRL and can take a load from
the CRL in a very busy environment.
Tip
Certificate validity can only be done by the CRL or OCSP. The CRL is the
default, the OCSP is used when you are looking for a faster validation.
OCSP Stapling/Certificate Stapling
Certificate stapling, also known as OCSP
stapling, is used when a web server bypasses the CRL to use the OCSP for faster
certificate validation
Certificate Signing Request (CSR):
This is the process of requesting a
new certificate.