fbpx
Wikipedia

Public key certificate

In cryptography, a public key certificate, also known as a digital certificate or identity certificate, is an electronic document used to prove the validity of a public key.[1][2] The certificate includes information about the key, information about the identity of its owner (called the subject), and the digital signature of an entity that has verified the certificate's contents (called the issuer). If the signature is valid, and the software examining the certificate trusts the issuer, then it can use that key to communicate securely with the certificate's subject. In email encryption, code signing, and e-signature systems, a certificate's subject is typically a person or organization. However, in Transport Layer Security (TLS) a certificate's subject is typically a computer or other device, though TLS certificates may identify organizations or individuals in addition to their core role in identifying devices. TLS, sometimes called by its older name Secure Sockets Layer (SSL), is notable for being a part of HTTPS, a protocol for securely browsing the web.

In a typical public-key infrastructure (PKI) scheme, the certificate issuer is a certificate authority (CA),[3] usually a company that charges customers to issue certificates for them. By contrast, in a web of trust scheme, individuals sign each other's keys directly, in a format that performs a similar function to a public key certificate. In case of key compromise, a certificate may need to be revoked.

The most common format for public key certificates is defined by X.509. Because X.509 is very general, the format is further constrained by profiles defined for certain use cases, such as Public Key Infrastructure (X.509) as defined in RFC 5280.

Types of certificate

 
The roles of root certificate, intermediate certificate and end-entity certificate as in the chain of trust.

TLS/SSL server certificate

The Transport Layer Security (TLS) protocol – as well as its outdated predecessor, the Secure Sockets Layer (SSL) protocol – ensures that the communication between a client computer and a server is secure. The protocol requires the server to present a digital certificate, proving that it is the intended destination. The connecting client conducts certification path validation, ensuring that:

  1. The subject of the certificate matches the hostname (not to be confused with the domain name) to which the client is trying to connect.
  2. A trusted certificate authority has signed the certificate.

The Subject field of the certificate must identify the primary hostname of the server as the Common Name.[clarification needed] A certificate may be valid for multiple hostnames (e.g., a domain and its subdomains). Such certificates are commonly called Subject Alternative Name (SAN) certificates or Unified Communications Certificates (UCC). These certificates contain the Subject Alternative Name field, though many CAs also put them into the Subject Common Name field for backward compatibility. If some of the hostnames contain an asterisk (*), a certificate may also be called a wildcard certificate.

Once the certification path validation is successful, the client can establish an encrypted connection with the server.

Internet-facing servers, such as public web servers, must obtain their certificates from a trusted, public certificate authority (CA).

TLS/SSL client certificate

Client certificates authenticate the client connecting to a TLS service, for instance to provide access control. Because most services provide access to individuals, rather than devices, most client certificates contain an email address or personal name rather than a hostname. In addition, the certificate authority that issues the client certificate is usually the service provider to which client connects because it is the provider that needs to perform authentication. Some service providers even offer free SSL certificates as part of their packages.[4]

While most web browsers support client certificates, the most common form of authentication on the Internet is a username and password pair. Client certificates are more common in virtual private networks (VPN) and Remote Desktop Services, where they authenticate devices.

Email certificate

In accordance with the S/MIME protocol, email certificates can both establish the message integrity and encrypt messages. To establish encrypted email communication, the communicating parties must have their digital certificates in advance. Each must send the other one digitally signed email and opt to import the sender's certificate.

Some publicly trusted certificate authorities provide email certificates, but more commonly S/MIME is used when communicating within a given organization, and that organization runs its own CA, which is trusted by participants in that email system.

Self-signed and root certificates

A self-signed certificate is a certificate with a subject that matches its issuer, and a signature that can be verified by its own public key.

Self-signed certificates have their own limited uses. They have full trust value when the issuer and the sole user are the same entity. For example, the Encrypting File System on Microsoft Windows issues a self-signed certificate on behalf of the encrypting user and uses it to transparently decrypt data on the fly. The digital certificate chain of trust starts with a self-signed certificate, called a root certificate, trust anchor, or trust root. A certificate authority self-signs a root certificate to be able to sign other certificates.

An intermediate certificate has a similar purpose to the root certificate – its only use is to sign other certificates. However, an intermediate certificate is not self-signed. A root certificate or another intermediate certificate needs to sign it.

An end-entity or leaf certificate is any certificate that cannot sign other certificates. For instance, TLS/SSL server and client certificates, email certificates, code signing certificates, and qualified certificates are all end-entity certificates.

Other certificates

  • EMV certificate: EMV is a payment method based on a technical standard for payment cards, payment terminals and automated teller machines (ATM). EMV payment cards are preloaded with a card issuer certificate, signed by the EMV certificate authority[5] to validate authenticity of the payment card during the payment transaction.
  • Code-signing certificate: Certificates can validate apps (or their binaries) to ensure they were not tampered with during delivery.
  • Qualified certificate: A certificate identifying an individual, typically for electronic signature purposes. These are most commonly used in Europe, where the eIDAS regulation standardizes them and requires their recognition.
  • Role-based certificate: Defined in the X.509 Certificate Policy for the Federal Bridge Certification Authority (FBCA), role-based certificates "identify a specific role on behalf of which the subscriber is authorized to act rather than the subscriber’s name and are issued in the interest of supporting accepted business practices."[6]
  • Group certificate: Defined in the X.509 Certificate Policy for the Federal Bridge Certification Authority (FBCA), for "cases where there are several entities acting in one capacity, and where non-repudiation for transactions is not desired."[7]

Common fields

These are some of the most common fields in certificates. Most certificates contain a number of fields not listed here. Note that in terms of a certificate's X.509 representation, a certificate is not "flat" but contains these fields nested in various structures within the certificate.

  • Serial Number: Used to uniquely identify the certificate within a CA's systems. In particular this is used to track revocation information.
  • Subject: The entity a certificate belongs to: a machine, an individual, or an organization.
  • Issuer: The entity that verified the information and signed the certificate.
  • Not Before: The earliest time and date on which the certificate is valid. Usually set to a few hours or days prior to the moment the certificate was issued, to avoid clock skew problems.
  • Not After: The time and date past which the certificate is no longer valid.
  • Key Usage: The valid cryptographic uses of the certificate's public key. Common values include digital signature validation, key encipherment, and certificate signing.
  • Extended Key Usage: The applications in which the certificate may be used. Common values include TLS server authentication, email protection, and code signing.
  • Public Key: A public key belonging to the certificate subject.
  • Signature Algorithm: This contain a hashing algorithm and a digital signature algorithm. For example "sha256RSA" where sha256 is the hashing algorithm and RSA is the signature algorithm.
  • Signature: The body of the certificate is hashed (hashing algorithm in "Signature Algorithm" field is used) and then the hash is signed (signature algorithm in the "Signature Algorithm" field is used) with the issuer's private key.

Example

This is an example of a decoded SSL/TLS certificate retrieved from SSL.com's website. The issuer's common name (CN) is shown as SSL.com EV SSL Intermediate CA RSA R3, identifying this as an Extended Validation (EV) certificate. Validated information about the website's owner (SSL Corp) is located in the Subject field. The X509v3 Subject Alternative Name field contains a list of domain names covered by the certificate. The X509v3 Extended Key Usage and X509v3 Key Usage fields show all appropriate uses.

Certificate: Data: Version: 3 (0x2) Serial Number: 72:14:11:d3:d7:e0:fd:02:aa:b0:4e:90:09:d4:db:31 Signature Algorithm: sha256WithRSAEncryption Issuer: C=US, ST=Texas, L=Houston, O=SSL Corp, CN=SSL.com EV SSL Intermediate CA RSA R3 Validity Not Before: Apr 18 22:15:06 2019 GMT Not After : Apr 17 22:15:06 2021 GMT Subject: C=US, ST=Texas, L=Houston, O=SSL Corp/serialNumber=NV20081614243, CN=www.ssl.com/postalCode=77098/businessCategory=Private Organization/street=3100 Richmond Ave/jurisdictionST=Nevada/jurisdictionC=US Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public-Key: (2048 bit) Modulus: 00:ad:0f:ef:c1:97:5a:9b:d8:1e ... Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Authority Key Identifier: keyid:BF:C1:5A:87:FF:28:FA:41:3D:FD:B7:4F:E4:1D:AF:A0:61:58:29:BD Authority Information Access: CA Issuers - URI:http://www.ssl.com/repository/SSLcom-SubCA-EV-SSL-RSA-4096-R3.crt OCSP - URI:http://ocsps.ssl.com X509v3 Subject Alternative Name: DNS:www.ssl.com, DNS:answers.ssl.com, DNS:faq.ssl.com, DNS:info.ssl.com, DNS:links.ssl.com, DNS:reseller.ssl.com, DNS:secure.ssl.com, DNS:ssl.com, DNS:support.ssl.com, DNS:sws.ssl.com, DNS:tools.ssl.com X509v3 Certificate Policies: Policy: 2.23.140.1.1 Policy: 1.2.616.1.113527.2.5.1.1 Policy: 1.3.6.1.4.1.38064.1.1.1.5 CPS: https://www.ssl.com/repository X509v3 Extended Key Usage: TLS Web Client Authentication, TLS Web Server Authentication X509v3 CRL Distribution Points: Full Name: URI:http://crls.ssl.com/SSLcom-SubCA-EV-SSL-RSA-4096-R3.crl X509v3 Subject Key Identifier: E7:37:48:DE:7D:C2:E1:9D:D0:11:25:21:B8:00:33:63:06:27:C1:5B X509v3 Key Usage: critical Digital Signature, Key Encipherment CT Precertificate SCTs: Signed Certificate Timestamp: Version  : v1 (0x0) Log ID  : 87:75:BF:E7:59:7C:F8:8C:43:99 ... Timestamp : Apr 18 22:25:08.574 2019 GMT Extensions: none Signature : ecdsa-with-SHA256 30:44:02:20:40:51:53:90:C6:A2 ... Signed Certificate Timestamp: Version  : v1 (0x0) Log ID  : A4:B9:09:90:B4:18:58:14:87:BB ... Timestamp : Apr 18 22:25:08.461 2019 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:20:43:80:9E:19:90:FD ... Signed Certificate Timestamp: Version  : v1 (0x0) Log ID  : 55:81:D4:C2:16:90:36:01:4A:EA ... Timestamp : Apr 18 22:25:08.769 2019 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:21:00:C1:3E:9F:F0:40 ... Signature Algorithm: sha256WithRSAEncryption 36:07:e7:3b:b7:45:97:ca:4d:6c ... 

Usage in the European Union

In the European Union, (advanced) electronic signatures on legal documents are commonly performed using digital signatures with accompanying identity certificates. However, only qualified electronic signatures (which require using a qualified trust service provider and signature creation device) are given the same power as a physical signature.

Certificate authorities

 
The procedure of obtaining a Public key certificate

In the X.509 trust model, a certificate authority (CA) is responsible for signing certificates. These certificates act as an introduction between two parties, which means that a CA acts as a trusted third party. A CA processes requests from people or organizations requesting certificates (called subscribers), verifies the information, and potentially signs an end-entity certificate based on that information. To perform this role effectively, a CA needs to have one or more broadly trusted root certificates or intermediate certificates and the corresponding private keys. CAs may achieve this broad trust by having their root certificates included in popular software, or by obtaining a cross-signature from another CA delegating trust. Other CAs are trusted within a relatively small community, like a business, and are distributed by other mechanisms like Windows Group Policy.

Certificate authorities are also responsible for maintaining up-to-date revocation information about certificates they have issued, indicating whether certificates are still valid. They provide this information through Online Certificate Status Protocol (OCSP) and/or Certificate Revocation Lists (CRLs). Some of the larger certificate authorities in the market include IdenTrust, DigiCert, and Sectigo.[8]

Root programs

Some major software contain a list of certificate authorities that are trusted by default.[citation needed] This makes it easier for end-users to validate certificates, and easier for people or organizations that request certificates to know which certificate authorities can issue a certificate that will be broadly trusted. This is particularly important in HTTPS, where a web site operator generally wants to get a certificate that is trusted by nearly all potential visitors to their web site.

The policies and processes a provider uses to decide which certificate authorities their software should trust are called root programs. The most influential root programs are:[citation needed]

  • Microsoft Root Program
  • Apple Root Program
  • Mozilla Root Program
  • Oracle Java root program
  • Adobe AATL Adobe Approved Trust List and EUTL root programs (used for document signing)

Browsers other than Firefox generally use the operating system's facilities to decide which certificate authorities are trusted. So, for instance, Chrome on Windows trusts the certificate authorities included in the Microsoft Root Program, while on macOS or iOS, Chrome trusts the certificate authorities in the Apple Root Program.[9] Edge and Safari use their respective operating system trust stores as well, but each is only available on a single OS. Firefox uses the Mozilla Root Program trust store on all platforms.

The Mozilla Root Program is operated publicly, and its certificate list is part of the open source Firefox web browser, so it is broadly used outside Firefox.[citation needed] For instance, while there is no common Linux Root Program, many Linux distributions, like Debian,[10] include a package that periodically copies the contents of the Firefox trust list, which is then used by applications.

Root programs generally provide a set of valid purposes with the certificates they include. For instance, some CAs may be considered trusted for issuing TLS server certificates, but not for code signing certificates. This is indicated with a set of trust bits in a root certificate storage system.

Revocation

A certificate may be revoked before it expires, which signals that it is no longer valid. Without revocation, an attacker would be able to exploit such a compromised or misissued certificate until expiry.[11] Hence, revocation is an important part of a public key infrastructure.[12] Revocation is performed by the issuing certificate authority, which produces a cryptographically authenticated statement of revocation.[13]

For distributing revocation information to clients, timeliness of the discovery of revocation (and hence the window for an attacker to exploit a compromised certificate) trades off against resource usage in querying revocation statuses and privacy concerns.[14] If revocation information is unavailable (either due to accident or an attack), clients must decide whether to fail-hard and treat a certificate as if it is revoked (and so degrade availability) or to fail-soft and treat it as unrevoked (and allow attackers to sidestep revocation).[15]

Due to the cost of revocation checks and the availability impact from potentially-unreliable remote services, Web browsers limit the revocation checks they will perform, and will fail-soft where they do.[16] Certificate revocation lists are too bandwidth-costly for routine use, and the Online Certificate Status Protocol presents connection latency and privacy issues. Other schemes have been proposed but have not yet been successfully deployed to enable fail-hard checking.[12]

Website security

The most common use of certificates is for HTTPS-based web sites. A web browser validates that an HTTPS web server is authentic, so that the user can feel secure that his/her interaction with the web site has no eavesdroppers and that the web site is who it claims to be. This security is important for electronic commerce. In practice, a web site operator obtains a certificate by applying to a certificate authority with a certificate signing request. The certificate request is an electronic document that contains the web site name, company information and the public key. The certificate provider signs the request, thus producing a public certificate. During web browsing, this public certificate is served to any web browser that connects to the web site and proves to the web browser that the provider believes it has issued a certificate to the owner of the web site.

As an example, when a user connects to https://www.example.com/ with their browser, if the browser does not give any certificate warning message, then the user can be theoretically sure that interacting with https://www.example.com/ is equivalent to interacting with the entity in contact with the email address listed in the public registrar under "example.com", even though that email address may not be displayed anywhere on the web site.[citation needed] No other surety of any kind is implied. Further, the relationship between the purchaser of the certificate, the operator of the web site, and the generator of the web site content may be tenuous and is not guaranteed.[citation needed] At best, the certificate guarantees uniqueness of the web site, provided that the web site itself has not been compromised (hacked) or the certificate issuing process subverted.

A certificate provider can opt to issue three types of certificates, each requiring its own degree of vetting rigor. In order of increasing rigor (and naturally, cost) they are: Domain Validation, Organization Validation and Extended Validation. These rigors are loosely agreed upon by voluntary participants in the CA/Browser Forum.[citation needed]

Validation levels

Domain validation

A certificate provider will issue a domain-validated (DV) certificate to a purchaser if the purchaser can demonstrate one vetting criterion: the right to administratively manage the affected DNS domain(s).

Organization validation

A certificate provider will issue an organization validation (OV) class certificate to a purchaser if the purchaser can meet two criteria: the right to administratively manage the domain name in question, and perhaps, the organization's actual existence as a legal entity. A certificate provider publishes its OV vetting criteria through its certificate policy.

Extended validation

To acquire an Extended Validation (EV) certificate, the purchaser must persuade the certificate provider of its legal identity, including manual verification checks by a human. As with OV certificates, a certificate provider publishes its EV vetting criteria through its certificate policy.

Until 2019, major browsers such as Chrome and Firefox generally offered users a visual indication of the legal identity when a site presented an EV certificate. This was done by showing the legal name before the domain, and a bright green color to highlight the change. Most browsers deprecated this feature[17][18] providing no visual difference to the user on the type of certificate used. This change followed security concerns raised by forensic experts and successful attempts to purchase EV certificates to impersonate famous organizations, proving the inefficiency of these visual indicators and highlighting potential abuses.[19]

Weaknesses

A web browser will give no warning to the user if a web site suddenly presents a different certificate, even if that certificate has a lower number of key bits, even if it has a different provider, and even if the previous certificate had an expiry date far into the future.[citation needed] Where certificate providers are under the jurisdiction of governments, those governments may have the freedom to order the provider to generate any certificate, such as for the purposes of law enforcement. Subsidiary wholesale certificate providers also have the freedom to generate any certificate.

All web browsers come with an extensive built-in list of trusted root certificates, many of which are controlled by organizations that may be unfamiliar to the user.[1] Each of these organizations is free to issue any certificate for any web site and have the guarantee that web browsers that include its root certificates will accept it as genuine. In this instance, end users must rely on the developer of the browser software to manage its built-in list of certificates and on the certificate providers to behave correctly and to inform the browser developer of problematic certificates. While uncommon, there have been incidents in which fraudulent certificates have been issued: in some cases, the browsers have detected the fraud; in others, some time passed before browser developers removed these certificates from their software.[20][21]

The list of built-in certificates is also not limited to those provided by the browser developer: users (and to a degree applications) are free to extend the list for special purposes such as for company intranets.[22] This means that if someone gains access to a machine and can install a new root certificate in the browser, that browser will recognize websites that use the inserted certificate as legitimate.

For provable security, this reliance on something external to the system has the consequence that any public key certification scheme has to rely on some special setup assumption, such as the existence of a certificate authority.[23]

Usefulness versus unsecured web sites

In spite of the limitations described above, certificate-authenticated TLS is considered mandatory by all security guidelines whenever a web site hosts confidential information or performs material transactions. This is because, in practice, in spite of the weaknesses described above, web sites secured by public key certificates are still more secure than unsecured http:// web sites.[24]

Standards

The National Institute of Standards and Technology (NIST) Computer Security Division[25] provides guidance documents for public key certificates:

  • SP 800-32 Introduction to Public Key Technology and the Federal PKI Infrastructure[26]
  • SP 800-25 Federal Agency Use of Public Key Technology for Digital Signatures and Authentication[27]

See also

References

  1. ^ a b "List of certificates included by Mozilla". Mozilla.org. Retrieved 30 July 2012.
  2. ^ Alrawais, Arwa; Alhothaily, Abdulrahman; Cheng, Xiuzhen; Hu, Chunqiang; Yu, Jiguo (2018-06-01). "SecureGuard: A Certificate Validation System in Public Key Infrastructure". IEEE Transactions on Vehicular Technology. 67 (6): 5399–5408. doi:10.1109/TVT.2018.2805700. ISSN 0018-9545. S2CID 49270949.
  3. ^ Chadwick, David W; Basden, Andrew (2001-10-31). "Evaluating Trust in a Public Key Certification Authority". Computers & Security. 20 (7): 592–611. doi:10.1016/S0167-4048(01)00710-6. ISSN 0167-4048.
  4. ^ "Free SSL Certificate | IONOS by 1&1". www.ionos.co.uk. Retrieved 2022-07-15.
  5. ^ "EMV CA". EMV Certificate Authority Worldwide. 2 December 2010. Retrieved January 20, 2020.
  6. ^ X.509 Certificate Policy For The Federal Bridge Certification Authority (FBCA)
  7. ^ X.509 Certificate Policy For The Federal Bridge Certification Authority (FBCA)
  8. ^ "Usage Statistics and Market Share of SSL Certificate Authorities for Websites, May 2020". w3techs.com. Retrieved 2020-05-01.
  9. ^ "Root Certificate Policy – The Chromium Projects". www.chromium.org. Retrieved 2017-03-19.
  10. ^ "ca-certificates in Launchpad". launchpad.net. Retrieved 2017-03-19.
  11. ^ Smith, Dickinson & Seamons 2020, p. 1.
  12. ^ a b Sheffer, Saint-Andre & Fossati 2022, 7.5. Certificate Revocation.
  13. ^ Chung et al. 2018, p. 3.
  14. ^ Smith, Dickinson & Seamons 2020, p. 10.
  15. ^ Larisch et al. 2017, p. 542.
  16. ^ Smith, Dickinson & Seamons 2020, p. 1-2.
  17. ^ "Firefox-dev Google group - Intent to Ship: Move Extended Validation Information out of the URL bar". groups.google.com. Retrieved 2020-08-03.
  18. ^ "Chrome Security-dev Google group - Upcoming Change to Chrome's Identity Indicators". groups.google.com. Retrieved 2020-08-03.
  19. ^ "Extended Validation Certificates are (Really, Really) Dead". troyhunt.com. 12 August 2019. Retrieved 2020-08-03.
  20. ^ "DigiNotar removal by Mozilla". Mozilla.org. Retrieved 30 July 2012.
  21. ^ "DigitNotar removal by Google". Retrieved 30 July 2012.
  22. ^ "Using certificates article at Mozilla.org". Mozilla.org. Retrieved 30 July 2012.
  23. ^ Ran Canetti: Universally Composable Signature, Certification, and Authentication. CSFW 2004, http://eprint.iacr.org/2003/239
  24. ^ Ben Laurie, Ian Goldberg (18 January 2014). "Replacing passwords on the Internet AKA post-Snowden Opportunistic Encryption" (PDF). {{cite journal}}: Cite journal requires |journal= (help)
  25. ^ "NIST Computer Security Publications – NIST Special Publications (SPs)". csrc.nist.gov. Retrieved 2016-06-19.
  26. ^ "SP 800-32 Introduction to Public Key Technology and the Federal PKI Infrastructure" (PDF). National Institute of Standards and Technology.
  27. ^ "SP 800-25 Federal Agency Use of Public Key Technology for Digital Signatures and Authentication" (PDF). National Institute of Standards and Technology.

Works cited

  • Chung, Taejoong; Lok, Jay; Chandrasekaran, Balakrishnan; Choffnes, David; Levin, Dave; Maggs, Bruce M.; Mislove, Alan; Rula, John; Sullivan, Nick; Wilson, Christo (2018). "Is the Web Ready for OCSP Must-Staple?" (PDF). Proceedings of the Internet Measurement Conference 2018. pp. 105–118. doi:10.1145/3278532.3278543. ISBN 9781450356190. S2CID 53223350.
  • Larisch, James; Choffnes, David; Levin, Dave; Maggs, Bruce M.; Mislove, Alan; Wilson, Christo (2017). "CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers". 2017 IEEE Symposium on Security and Privacy (SP). pp. 539–556. doi:10.1109/sp.2017.17. ISBN 978-1-5090-5533-3. S2CID 3926509.
  • Sheffer, Yaron; Saint-Andre, Pierre; Fossati, Thomas (November 2022). Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). doi:10.17487/RFC9325. RFC 9325.
  • Smith, Trevor; Dickinson, Luke; Seamons, Kent (2020). "Let's Revoke: Scalable Global Certificate Revocation". Proceedings 2020 Network and Distributed System Security Symposium. doi:10.14722/ndss.2020.24084. ISBN 978-1-891562-61-7. S2CID 211268930.

public, certificate, cryptography, public, certificate, also, known, digital, certificate, identity, certificate, electronic, document, used, prove, validity, public, certificate, includes, information, about, information, about, identity, owner, called, subje. In cryptography a public key certificate also known as a digital certificate or identity certificate is an electronic document used to prove the validity of a public key 1 2 The certificate includes information about the key information about the identity of its owner called the subject and the digital signature of an entity that has verified the certificate s contents called the issuer If the signature is valid and the software examining the certificate trusts the issuer then it can use that key to communicate securely with the certificate s subject In email encryption code signing and e signature systems a certificate s subject is typically a person or organization However in Transport Layer Security TLS a certificate s subject is typically a computer or other device though TLS certificates may identify organizations or individuals in addition to their core role in identifying devices TLS sometimes called by its older name Secure Sockets Layer SSL is notable for being a part of HTTPS a protocol for securely browsing the web In a typical public key infrastructure PKI scheme the certificate issuer is a certificate authority CA 3 usually a company that charges customers to issue certificates for them By contrast in a web of trust scheme individuals sign each other s keys directly in a format that performs a similar function to a public key certificate In case of key compromise a certificate may need to be revoked The most common format for public key certificates is defined by X 509 Because X 509 is very general the format is further constrained by profiles defined for certain use cases such as Public Key Infrastructure X 509 as defined in RFC 5280 Contents 1 Types of certificate 1 1 TLS SSL server certificate 1 2 TLS SSL client certificate 1 3 Email certificate 1 4 Self signed and root certificates 1 5 Other certificates 2 Common fields 2 1 Example 3 Usage in the European Union 4 Certificate authorities 5 Root programs 6 Revocation 7 Website security 7 1 Validation levels 7 1 1 Domain validation 7 1 2 Organization validation 7 1 3 Extended validation 7 2 Weaknesses 7 3 Usefulness versus unsecured web sites 8 Standards 9 See also 10 References 11 Works citedTypes of certificate Edit The roles of root certificate intermediate certificate and end entity certificate as in the chain of trust TLS SSL server certificate Edit The Transport Layer Security TLS protocol as well as its outdated predecessor the Secure Sockets Layer SSL protocol ensures that the communication between a client computer and a server is secure The protocol requires the server to present a digital certificate proving that it is the intended destination The connecting client conducts certification path validation ensuring that The subject of the certificate matches the hostname not to be confused with the domain name to which the client is trying to connect A trusted certificate authority has signed the certificate The Subject field of the certificate must identify the primary hostname of the server as the Common Name clarification needed A certificate may be valid for multiple hostnames e g a domain and its subdomains Such certificates are commonly called Subject Alternative Name SAN certificates or Unified Communications Certificates UCC These certificates contain the Subject Alternative Name field though many CAs also put them into the Subject Common Name field for backward compatibility If some of the hostnames contain an asterisk a certificate may also be called a wildcard certificate Once the certification path validation is successful the client can establish an encrypted connection with the server Internet facing servers such as public web servers must obtain their certificates from a trusted public certificate authority CA TLS SSL client certificate Edit Client certificates authenticate the client connecting to a TLS service for instance to provide access control Because most services provide access to individuals rather than devices most client certificates contain an email address or personal name rather than a hostname In addition the certificate authority that issues the client certificate is usually the service provider to which client connects because it is the provider that needs to perform authentication Some service providers even offer free SSL certificates as part of their packages 4 While most web browsers support client certificates the most common form of authentication on the Internet is a username and password pair Client certificates are more common in virtual private networks VPN and Remote Desktop Services where they authenticate devices Email certificate Edit In accordance with the S MIME protocol email certificates can both establish the message integrity and encrypt messages To establish encrypted email communication the communicating parties must have their digital certificates in advance Each must send the other one digitally signed email and opt to import the sender s certificate Some publicly trusted certificate authorities provide email certificates but more commonly S MIME is used when communicating within a given organization and that organization runs its own CA which is trusted by participants in that email system Self signed and root certificates Edit Main articles Root certificate and Self signed certificate A self signed certificate is a certificate with a subject that matches its issuer and a signature that can be verified by its own public key Self signed certificates have their own limited uses They have full trust value when the issuer and the sole user are the same entity For example the Encrypting File System on Microsoft Windows issues a self signed certificate on behalf of the encrypting user and uses it to transparently decrypt data on the fly The digital certificate chain of trust starts with a self signed certificate called a root certificate trust anchor or trust root A certificate authority self signs a root certificate to be able to sign other certificates An intermediate certificate has a similar purpose to the root certificate its only use is to sign other certificates However an intermediate certificate is not self signed A root certificate or another intermediate certificate needs to sign it An end entity or leaf certificate is any certificate that cannot sign other certificates For instance TLS SSL server and client certificates email certificates code signing certificates and qualified certificates are all end entity certificates Other certificates Edit EMV certificate EMV is a payment method based on a technical standard for payment cards payment terminals and automated teller machines ATM EMV payment cards are preloaded with a card issuer certificate signed by the EMV certificate authority 5 to validate authenticity of the payment card during the payment transaction Code signing certificate Certificates can validate apps or their binaries to ensure they were not tampered with during delivery Qualified certificate A certificate identifying an individual typically for electronic signature purposes These are most commonly used in Europe where the eIDAS regulation standardizes them and requires their recognition Role based certificate Defined in the X 509 Certificate Policy for the Federal Bridge Certification Authority FBCA role based certificates identify a specific role on behalf of which the subscriber is authorized to act rather than the subscriber s name and are issued in the interest of supporting accepted business practices 6 Group certificate Defined in the X 509 Certificate Policy for the Federal Bridge Certification Authority FBCA for cases where there are several entities acting in one capacity and where non repudiation for transactions is not desired 7 Common fields EditSee also X 509 Structure of a certificateThese are some of the most common fields in certificates Most certificates contain a number of fields not listed here Note that in terms of a certificate s X 509 representation a certificate is not flat but contains these fields nested in various structures within the certificate Serial Number Used to uniquely identify the certificate within a CA s systems In particular this is used to track revocation information Subject The entity a certificate belongs to a machine an individual or an organization Issuer The entity that verified the information and signed the certificate Not Before The earliest time and date on which the certificate is valid Usually set to a few hours or days prior to the moment the certificate was issued to avoid clock skew problems Not After The time and date past which the certificate is no longer valid Key Usage The valid cryptographic uses of the certificate s public key Common values include digital signature validation key encipherment and certificate signing Extended Key Usage The applications in which the certificate may be used Common values include TLS server authentication email protection and code signing Public Key A public key belonging to the certificate subject Signature Algorithm This contain a hashing algorithm and a digital signature algorithm For example sha256RSA where sha256 is the hashing algorithm and RSA is the signature algorithm Signature The body of the certificate is hashed hashing algorithm in Signature Algorithm field is used and then the hash is signed signature algorithm in the Signature Algorithm field is used with the issuer s private key Example Edit This is an example of a decoded SSL TLS certificate retrieved from SSL com s website The issuer s common name CN is shown as SSL com EV SSL Intermediate CA RSA R3 identifying this as an Extended Validation EV certificate Validated information about the website s owner SSL Corp is located in the Subject field The X509v3 Subject Alternative Name field contains a list of domain names covered by the certificate The X509v3 Extended Key Usage and X509v3 Key Usage fields show all appropriate uses Certificate Data Version 3 0x2 Serial Number 72 14 11 d3 d7 e0 fd 02 aa b0 4e 90 09 d4 db 31 Signature Algorithm sha256WithRSAEncryption Issuer C US ST Texas L Houston O SSL Corp CN SSL com EV SSL Intermediate CA RSA R3 Validity Not Before Apr 18 22 15 06 2019 GMT Not After Apr 17 22 15 06 2021 GMT Subject C US ST Texas L Houston O SSL Corp serialNumber NV20081614243 CN www ssl com postalCode 77098 businessCategory Private Organization street 3100 Richmond Ave jurisdictionST Nevada jurisdictionC US Subject Public Key Info Public Key Algorithm rsaEncryption RSA Public Key 2048 bit Modulus 00 ad 0f ef c1 97 5a 9b d8 1e Exponent 65537 0x10001 X509v3 extensions X509v3 Authority Key Identifier keyid BF C1 5A 87 FF 28 FA 41 3D FD B7 4F E4 1D AF A0 61 58 29 BD Authority Information Access CA Issuers URI http www ssl com repository SSLcom SubCA EV SSL RSA 4096 R3 crt OCSP URI http ocsps ssl com X509v3 Subject Alternative Name DNS www ssl com DNS answers ssl com DNS faq ssl com DNS info ssl com DNS links ssl com DNS reseller ssl com DNS secure ssl com DNS ssl com DNS support ssl com DNS sws ssl com DNS tools ssl com X509v3 Certificate Policies Policy 2 23 140 1 1 Policy 1 2 616 1 113527 2 5 1 1 Policy 1 3 6 1 4 1 38064 1 1 1 5 CPS https www ssl com repository X509v3 Extended Key Usage TLS Web Client Authentication TLS Web Server Authentication X509v3 CRL Distribution Points Full Name URI http crls ssl com SSLcom SubCA EV SSL RSA 4096 R3 crl X509v3 Subject Key Identifier E7 37 48 DE 7D C2 E1 9D D0 11 25 21 B8 00 33 63 06 27 C1 5B X509v3 Key Usage critical Digital Signature Key Encipherment CT Precertificate SCTs Signed Certificate Timestamp Version v1 0x0 Log ID 87 75 BF E7 59 7C F8 8C 43 99 Timestamp Apr 18 22 25 08 574 2019 GMT Extensions none Signature ecdsa with SHA256 30 44 02 20 40 51 53 90 C6 A2 Signed Certificate Timestamp Version v1 0x0 Log ID A4 B9 09 90 B4 18 58 14 87 BB Timestamp Apr 18 22 25 08 461 2019 GMT Extensions none Signature ecdsa with SHA256 30 45 02 20 43 80 9E 19 90 FD Signed Certificate Timestamp Version v1 0x0 Log ID 55 81 D4 C2 16 90 36 01 4A EA Timestamp Apr 18 22 25 08 769 2019 GMT Extensions none Signature ecdsa with SHA256 30 45 02 21 00 C1 3E 9F F0 40 Signature Algorithm sha256WithRSAEncryption 36 07 e7 3b b7 45 97 ca 4d 6c Usage in the European Union EditIn the European Union advanced electronic signatures on legal documents are commonly performed using digital signatures with accompanying identity certificates However only qualified electronic signatures which require using a qualified trust service provider and signature creation device are given the same power as a physical signature Certificate authorities EditMain article Certificate authority The procedure of obtaining a Public key certificate In the X 509 trust model a certificate authority CA is responsible for signing certificates These certificates act as an introduction between two parties which means that a CA acts as a trusted third party A CA processes requests from people or organizations requesting certificates called subscribers verifies the information and potentially signs an end entity certificate based on that information To perform this role effectively a CA needs to have one or more broadly trusted root certificates or intermediate certificates and the corresponding private keys CAs may achieve this broad trust by having their root certificates included in popular software or by obtaining a cross signature from another CA delegating trust Other CAs are trusted within a relatively small community like a business and are distributed by other mechanisms like Windows Group Policy Certificate authorities are also responsible for maintaining up to date revocation information about certificates they have issued indicating whether certificates are still valid They provide this information through Online Certificate Status Protocol OCSP and or Certificate Revocation Lists CRLs Some of the larger certificate authorities in the market include IdenTrust DigiCert and Sectigo 8 Root programs EditSome major software contain a list of certificate authorities that are trusted by default citation needed This makes it easier for end users to validate certificates and easier for people or organizations that request certificates to know which certificate authorities can issue a certificate that will be broadly trusted This is particularly important in HTTPS where a web site operator generally wants to get a certificate that is trusted by nearly all potential visitors to their web site The policies and processes a provider uses to decide which certificate authorities their software should trust are called root programs The most influential root programs are citation needed Microsoft Root Program Apple Root Program Mozilla Root Program Oracle Java root program Adobe AATL Adobe Approved Trust List and EUTL root programs used for document signing Browsers other than Firefox generally use the operating system s facilities to decide which certificate authorities are trusted So for instance Chrome on Windows trusts the certificate authorities included in the Microsoft Root Program while on macOS or iOS Chrome trusts the certificate authorities in the Apple Root Program 9 Edge and Safari use their respective operating system trust stores as well but each is only available on a single OS Firefox uses the Mozilla Root Program trust store on all platforms The Mozilla Root Program is operated publicly and its certificate list is part of the open source Firefox web browser so it is broadly used outside Firefox citation needed For instance while there is no common Linux Root Program many Linux distributions like Debian 10 include a package that periodically copies the contents of the Firefox trust list which is then used by applications Root programs generally provide a set of valid purposes with the certificates they include For instance some CAs may be considered trusted for issuing TLS server certificates but not for code signing certificates This is indicated with a set of trust bits in a root certificate storage system Revocation EditMain article Certificate revocation A certificate may be revoked before it expires which signals that it is no longer valid Without revocation an attacker would be able to exploit such a compromised or misissued certificate until expiry 11 Hence revocation is an important part of a public key infrastructure 12 Revocation is performed by the issuing certificate authority which produces a cryptographically authenticated statement of revocation 13 For distributing revocation information to clients timeliness of the discovery of revocation and hence the window for an attacker to exploit a compromised certificate trades off against resource usage in querying revocation statuses and privacy concerns 14 If revocation information is unavailable either due to accident or an attack clients must decide whether to fail hard and treat a certificate as if it is revoked and so degrade availability or to fail soft and treat it as unrevoked and allow attackers to sidestep revocation 15 Due to the cost of revocation checks and the availability impact from potentially unreliable remote services Web browsers limit the revocation checks they will perform and will fail soft where they do 16 Certificate revocation lists are too bandwidth costly for routine use and the Online Certificate Status Protocol presents connection latency and privacy issues Other schemes have been proposed but have not yet been successfully deployed to enable fail hard checking 12 Website security EditThe most common use of certificates is for HTTPS based web sites A web browser validates that an HTTPS web server is authentic so that the user can feel secure that his her interaction with the web site has no eavesdroppers and that the web site is who it claims to be This security is important for electronic commerce In practice a web site operator obtains a certificate by applying to a certificate authority with a certificate signing request The certificate request is an electronic document that contains the web site name company information and the public key The certificate provider signs the request thus producing a public certificate During web browsing this public certificate is served to any web browser that connects to the web site and proves to the web browser that the provider believes it has issued a certificate to the owner of the web site As an example when a user connects to https www example com with their browser if the browser does not give any certificate warning message then the user can be theoretically sure that interacting with https www example com is equivalent to interacting with the entity in contact with the email address listed in the public registrar under example com even though that email address may not be displayed anywhere on the web site citation needed No other surety of any kind is implied Further the relationship between the purchaser of the certificate the operator of the web site and the generator of the web site content may be tenuous and is not guaranteed citation needed At best the certificate guarantees uniqueness of the web site provided that the web site itself has not been compromised hacked or the certificate issuing process subverted A certificate provider can opt to issue three types of certificates each requiring its own degree of vetting rigor In order of increasing rigor and naturally cost they are Domain Validation Organization Validation and Extended Validation These rigors are loosely agreed upon by voluntary participants in the CA Browser Forum citation needed Validation levels Edit Domain validation Edit Main article Domain validated certificate A certificate provider will issue a domain validated DV certificate to a purchaser if the purchaser can demonstrate one vetting criterion the right to administratively manage the affected DNS domain s Organization validation Edit A certificate provider will issue an organization validation OV class certificate to a purchaser if the purchaser can meet two criteria the right to administratively manage the domain name in question and perhaps the organization s actual existence as a legal entity A certificate provider publishes its OV vetting criteria through its certificate policy Extended validation Edit Main article Extended Validation Certificate To acquire an Extended Validation EV certificate the purchaser must persuade the certificate provider of its legal identity including manual verification checks by a human As with OV certificates a certificate provider publishes its EV vetting criteria through its certificate policy Until 2019 major browsers such as Chrome and Firefox generally offered users a visual indication of the legal identity when a site presented an EV certificate This was done by showing the legal name before the domain and a bright green color to highlight the change Most browsers deprecated this feature 17 18 providing no visual difference to the user on the type of certificate used This change followed security concerns raised by forensic experts and successful attempts to purchase EV certificates to impersonate famous organizations proving the inefficiency of these visual indicators and highlighting potential abuses 19 Weaknesses Edit A web browser will give no warning to the user if a web site suddenly presents a different certificate even if that certificate has a lower number of key bits even if it has a different provider and even if the previous certificate had an expiry date far into the future citation needed Where certificate providers are under the jurisdiction of governments those governments may have the freedom to order the provider to generate any certificate such as for the purposes of law enforcement Subsidiary wholesale certificate providers also have the freedom to generate any certificate All web browsers come with an extensive built in list of trusted root certificates many of which are controlled by organizations that may be unfamiliar to the user 1 Each of these organizations is free to issue any certificate for any web site and have the guarantee that web browsers that include its root certificates will accept it as genuine In this instance end users must rely on the developer of the browser software to manage its built in list of certificates and on the certificate providers to behave correctly and to inform the browser developer of problematic certificates While uncommon there have been incidents in which fraudulent certificates have been issued in some cases the browsers have detected the fraud in others some time passed before browser developers removed these certificates from their software 20 21 The list of built in certificates is also not limited to those provided by the browser developer users and to a degree applications are free to extend the list for special purposes such as for company intranets 22 This means that if someone gains access to a machine and can install a new root certificate in the browser that browser will recognize websites that use the inserted certificate as legitimate For provable security this reliance on something external to the system has the consequence that any public key certification scheme has to rely on some special setup assumption such as the existence of a certificate authority 23 Usefulness versus unsecured web sites Edit In spite of the limitations described above certificate authenticated TLS is considered mandatory by all security guidelines whenever a web site hosts confidential information or performs material transactions This is because in practice in spite of the weaknesses described above web sites secured by public key certificates are still more secure than unsecured http web sites 24 Standards EditThe National Institute of Standards and Technology NIST Computer Security Division 25 provides guidance documents for public key certificates SP 800 32 Introduction to Public Key Technology and the Federal PKI Infrastructure 26 SP 800 25 Federal Agency Use of Public Key Technology for Digital Signatures and Authentication 27 See also EditAuthorization certificate Pretty Good PrivacyReferences Edit a b List of certificates included by Mozilla Mozilla org Retrieved 30 July 2012 Alrawais Arwa Alhothaily Abdulrahman Cheng Xiuzhen Hu Chunqiang Yu Jiguo 2018 06 01 SecureGuard A Certificate Validation System in Public Key Infrastructure IEEE Transactions on Vehicular Technology 67 6 5399 5408 doi 10 1109 TVT 2018 2805700 ISSN 0018 9545 S2CID 49270949 Chadwick David W Basden Andrew 2001 10 31 Evaluating Trust in a Public Key Certification Authority Computers amp Security 20 7 592 611 doi 10 1016 S0167 4048 01 00710 6 ISSN 0167 4048 Free SSL Certificate IONOS by 1 amp 1 www ionos co uk Retrieved 2022 07 15 EMV CA EMV Certificate Authority Worldwide 2 December 2010 Retrieved January 20 2020 X 509 Certificate Policy For The Federal Bridge Certification Authority FBCA X 509 Certificate Policy For The Federal Bridge Certification Authority FBCA Usage Statistics and Market Share of SSL Certificate Authorities for Websites May 2020 w3techs com Retrieved 2020 05 01 Root Certificate Policy The Chromium Projects www chromium org Retrieved 2017 03 19 ca certificates in Launchpad launchpad net Retrieved 2017 03 19 Smith Dickinson amp Seamons 2020 p 1 a b Sheffer Saint Andre amp Fossati 2022 7 5 Certificate Revocation Chung et al 2018 p 3 Smith Dickinson amp Seamons 2020 p 10 Larisch et al 2017 p 542 Smith Dickinson amp Seamons 2020 p 1 2 Firefox dev Google group Intent to Ship Move Extended Validation Information out of the URL bar groups google com Retrieved 2020 08 03 Chrome Security dev Google group Upcoming Change to Chrome s Identity Indicators groups google com Retrieved 2020 08 03 Extended Validation Certificates are Really Really Dead troyhunt com 12 August 2019 Retrieved 2020 08 03 DigiNotar removal by Mozilla Mozilla org Retrieved 30 July 2012 DigitNotar removal by Google Retrieved 30 July 2012 Using certificates article at Mozilla org Mozilla org Retrieved 30 July 2012 Ran Canetti Universally Composable Signature Certification and Authentication CSFW 2004 http eprint iacr org 2003 239 Ben Laurie Ian Goldberg 18 January 2014 Replacing passwords on the Internet AKA post Snowden Opportunistic Encryption PDF a href Template Cite journal html title Template Cite journal cite journal a Cite journal requires journal help NIST Computer Security Publications NIST Special Publications SPs csrc nist gov Retrieved 2016 06 19 SP 800 32 Introduction to Public Key Technology and the Federal PKI Infrastructure PDF National Institute of Standards and Technology SP 800 25 Federal Agency Use of Public Key Technology for Digital Signatures and Authentication PDF National Institute of Standards and Technology Works cited EditChung Taejoong Lok Jay Chandrasekaran Balakrishnan Choffnes David Levin Dave Maggs Bruce M Mislove Alan Rula John Sullivan Nick Wilson Christo 2018 Is the Web Ready for OCSP Must Staple PDF Proceedings of the Internet Measurement Conference 2018 pp 105 118 doi 10 1145 3278532 3278543 ISBN 9781450356190 S2CID 53223350 Larisch James Choffnes David Levin Dave Maggs Bruce M Mislove Alan Wilson Christo 2017 CRLite A Scalable System for Pushing All TLS Revocations to All Browsers 2017 IEEE Symposium on Security and Privacy SP pp 539 556 doi 10 1109 sp 2017 17 ISBN 978 1 5090 5533 3 S2CID 3926509 Sheffer Yaron Saint Andre Pierre Fossati Thomas November 2022 Recommendations for Secure Use of Transport Layer Security TLS and Datagram Transport Layer Security DTLS doi 10 17487 RFC9325 RFC 9325 Smith Trevor Dickinson Luke Seamons Kent 2020 Let s Revoke Scalable Global Certificate Revocation Proceedings 2020 Network and Distributed System Security Symposium doi 10 14722 ndss 2020 24084 ISBN 978 1 891562 61 7 S2CID 211268930 Retrieved from https en wikipedia org w index php title Public key certificate amp oldid 1151633074, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.