ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB
|
|
|
- Nigel Booker
- 10 years ago
- Views:
Transcription
1 ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB Scott Rea DigiCert, Inc. Session ID: SEC-T02 Session Classification: Intermediate
2 BACKGROUND: WHAT IS A CERTIFICATION AUTHORITY?
3 What is a certification authority? CA generates roots in secure environment ceremony, video recorded, audited, keys on HSMs CA distributes roots to browsers, operating systems to include in trusted root store Browsers/OS check for compliance with root store rules, contract, audit Browsers/OS distribute CA roots to clients in software updates
4 What is a certification authority? CA provides certs to customers chaining to trusted roots embedded in Operating Systems and Browsers Customers install certs on their servers for secure web pages Clients go to secure web pages client checks for root in browser trusted root store If root is in browser s trusted root store: encrypted session, favorable padlock UI (including EV green bar)
5 What is a certification authority? If root not in client trusted root store for browser warning displayed If certificate revoked or expired warning displayed CAs and browsers have the ability to revoke roots, sub-roots, and certificates for problems CAs must complete annual audits, follow CA/B Forum rules to remain in browser trusted root stores Stronger rules, higher CA standards for green Extended Validations or EV display
6 RECENT CA SECURITY ISSUES AND THEIR CONSEQUENCES
7 (2011) Problem: Harm: Response: CA s system hacked through external RA/Reseller portal; 9 fake certs issued for various top domains Unknown. Hacking claims by Iranian hacker never verified Certs quickly revoked by CA and untrusted by browsers
8 (2011) Problem: Harm: Response: Hacking/complete compromise of CA system over many months; cert issuance logs erased (no record); 531 or more fake certs issued Potentially great (many OCSP checks from Iran). Hacking claims by Iranian hacker never verified Some certs revoked by CA (no complete list). DigiNotar roots untrusted by browsers; CA out of business
9 Malaysian Sub-CA: Digicert Sdn. Bhd. ** (2011) **Note: NOT the same as US company DigiCert Inc. Problem: Harm: Independent Sub-CA issued bit certs off chained root - too weak, no EKU limiting extension to TLS server certs, violated CA/Browser Forum rules Cert stolen from Malaysian government, compromised, used to sign malware Response: Browsers issued patch to untrust the Sub- CA, all certs; new rules to audit sub-cas
10 (2012) Problem: Harm: Response: Customer cert issued with wrong extensions customer had powers of a sub-ca, could issue certs in other domain names None detected. Unintentionally used by customer at firewall in MITM configuration; accidentally issued google.com cert never used. Cert revoked and untrusted by browsers, all CAs scanned past certs
11 (2012) Problem: Harm: Response: CA issued Sub-CA cert to enterprise for MITM security screening of enterprise and web communications; could be used to create certs for top domains None detected. However, controversial practice, now deprecated by several browsers Trustwave revoked MITM Sub-CA and discontinued issuing them to enterprise customers
12 Myth Busting Myth: Fact: There are more than 600 trusted CAs in the browsers too many to handle, any of these CAs can issue (fake) certs, there is no regulation of CAs Not true Many CAs detected by SSL Observatory and others are only sub-cas of major CAs, all subject to the same controls by the parent. The Mozilla root store has only 65 trusted root holders (with their various sub-cas). Plus, some of 600 CAs in studies are selfsigned only, not trusted in browsers All CAs in browsers must follow the browser rules, CA/Browser Forum rules, audit regimes.
13 Summary and Conclusion Putting it in perspective: Certs issued worldwide: 2,000,000 per year Bad certs issued: maybe 1,000 over 11 years (~91 bad certs per year) mostly single incident (DigiNotar) Accuracy ratio for certs issued each year: % (Error rate 0.005%) US Passport Office and state Departments of Motor Vehicles are NOT this accurate Significant harm from bad certs? Only likely in DigiNotar case (actual harm unknown) CAs are continuously improving security, processes The state of SSL is stronger today, because of these responses
14 Summary and Conclusion Relatively few CA security issues over 15 years Most breaches resulted in no known harm Quickly remediated Industry practices constantly improved by CAs, browsers without government regulation Browser root program requirements raise the bar CA/Browser Forum (2005 to date) raised the bar: EV Guidelines (2007), Baseline Requirements (2011), Network and Security Controls (2013) WebTrust, ETSI audit requirements ( date) New: CA Security Council OTA CA Best Practices
15 ALTERNATIVES AND ENHANCEMENTS TO CERTIFICATION AUTHORITIES FOR A SECURE WEB
16 Proposed Solutions to Mitigate Attacks Despite the minimized risks, a number of alternatives or enhancements to CAs were nonetheless proposed including: Perspectives Convergence MECAI (Mutually Endorsing CA Infrastructure) DANE Public Key Pinning Sovereign Keys CAA Record in DNSSEC Certificate Transparency
17 Research to Evaluate Proposals Research efforts to set a baseline for how we might evaluate the basic options of these Proposals has been done, including work by NYU and Dartmouth. The details of that research is not the focus here, however, the methodology and specific scoring used can be discussed afterwards for any interested parties. The conclusion of that research to date favors three proposals: CT, CAA, Pinning. The research calls for still further investigations, and helps set a baseline for future work.
18 Favored Proposals In addition to the aforementioned and other research, the consensus of the community seems to also be favoring CT, CAA, Pinning, and to a much lesser extent DANE. The primary focus of this presentation will be on CT, CAA, and Pinning These three have some advantages to DANE, primarily in that they do not introduce new trust anchors who are not experienced and do not have standards for validating identities. Furthermore, absent universal DNSSEC implementation, DANE is far from feasible. Additionally, DANE lacks the support of Google, and is understood it to be incompatible with Pinning
19 Certificate Transparency
20 Certificate Transparency Certificates should be public record so that you can see what CAs are asserting about your organization.
21 Certificate Transparency Internal CAs are not impacted: internal certificates do not need to be logged. Internal hostnames in public certificates don't need to be logged - clients can be configured with a list of internal domains or intermediate CAs can be name constrained. Is based on existing technologies that are easily supported with industry coordination
22 Certificate Transparency Pros Enhances the current CA infrastructure rather than replacing it. Doesn't require any actions by sites in the vast majority of cases. Cons Requires all CAs to be updated. Deployment will take many years. Public records require vigilance to be useful.
23 Certification Authority Authorization
24 Certification Authority Authorization Certification Authority Authorization (CAA) IETF RFC 6844 drafted by Comodo Mechanism for preventing and detecting mis-issued certificates from Cas Mechanism Based on DNS resource record that lists CAs authorized to issue certs for a domain PRIOR to issuing a certificate, CA checks for a CAA record to ensure CA is allowed to issue cert for that domain
25 Certification Authority Authorization Context and Key Points Benefit in that it s a verification to see whether a CA should be associated with a cert for a specific domain Different from DANE in that this is a preventative approach to issuing rogue certs CAA record doesn t say which key must be in the end-entity cert (as DANE does) entry is at the CA level Supports wildcard certs More than one CA may be specified for each DNS record CABF is starting discussions on CAA for potential usage by CAs
26 Certification Authority Authorization Benefits Good complement to existing ecosystem to prevent and detect mis-issuance from CAs Low barrier for deployment for CAs CAs need to check CAA record Does not require big-bang adoption can be phased per CA and per certificate customer Raises the bar on CA security bad actor must be able to attack DNS or suppress CA s CAA check
27 Certification Authority Authorization Risks DNSSEC is recommended but not required, opening up potential for DNS record manipulation CA and customer opt-in nature makes CAA nondeterministic Potential perception of CAA being a mechanism for CAs to lock in customers
28 Public Key Pinning
29 Public Key Pinning Client (browser) tracks what certs are used by a website Can be preloaded into browser Or (in a more scalable implementation) Web server makes assertion about what certificate(s) it will use Generate an alert or block the connection if a different cert is used Two current IETF drafts: Trust Assertions for Certificate Keys Public Key Pinning Extension for HTTP
30 Public Key Pinning Benefits Reduces attack surface for a given site from approx. 65 roots (and potentially hundreds of intermediates) down to 1-2 roots, or less Proven value in detecting compromise Enhances existing ecosystem Doesn't suffer from CAA's potential "lock in" issue
31 Public Key Pinning Issues Trust on First Use doesn t protect initial connection Doesn t protect against key compromise Creates operational challenges with key exchanges May be best as a reporting mechanism Long deployment horizon Impact of false positives in "hard fail" mode
32 Opinion & Conclusions
33 Opinion on CAA, Pinning & DANE Pinning detected TurkTrust and likely would have detected DigiNotar. It is incompatible with DANE, but is the better option of the two, so we support it. To work properly, it must enable pinning of multiple CAs and not just one or two, so that redundancy is built in to replace a CA in the event of a compromise. CAA is a good proposal in theory, and if it will allow multiple CA records, then it can work. It lacks enforcement teeth, however, making it weaker than some of the other alternatives.
34 Opinion on CT We applaud Google for working on a practical implementation that meets strong criteria Scalable, Backwards compatible, Does not introduce unintended consequences of new technology and trust anchors who lack experience and standards for validating identities, Is much further along than some of the other proposals.
35 Opinion on CT DigiCert has been involved in the early stages with Google to test the CA proof and log viability on behalf of CAs. CT has promise and DigiCert is interested in continuing to work with Google There are still has some unanswered questions that need to be resolved. CT enhances existing self-regulating mechanisms by leveraging an existing, refined and time-tested CA trustanchor system while avoiding the unintended consequences of new technology in unfamiliar space
36 Next Steps More research and multi-stakeholder collaboration is needed. CAs are committed and DigiCert is taking a lead role, especially with CT. Many smart people are working on these issues, and the future looks good.
37 Conclusions The CA industry is an active, collaborative one that has already made great strides since DigiNotar. In addition to reviewing these initiatives, the community is also evolving revocation practices to be more effective and produce less latency, increasing the likelihood for adoption. CABF initiatives such as Baseline Requirements (compliance is now part of WebTrust audits), Network Security Guidelines, an active Code Signing Working Group and other efforts are providing greater trust.
38 Conclusions CAs have formed the CASC to address better SSL utilization, configuration and best practices from an educational standpoint Other relying parties are also stepping up their collaboration. As a whole, SSL is stronger and more secure than it was a few years ago, and indications are that it will only get stronger.
39 Conclusions Where do these proposals go from here? Which proposals get adopted and in which form(s) is yet to be decided. Although the ones highlighted today clearly have the most support i.e. CT, CAA, Pinning, and to a lesser extent DANE Regardless, SSL will improve. Systems that retain the improvements made by CAs as the knowledgeable trust anchors will advance internet security most effectively.
40 Questions Scott Rea - ([email protected])
SSL and Browsers: The Pillars of Broken Security
SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the
SSL BEST PRACTICES OVERVIEW
SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
Microsoft Trusted Root Certificate: Program Requirements
Microsoft Trusted Root Certificate: Program Requirements 1. Introduction The Microsoft Root Certificate Program supports the distribution of root certificates, enabling customers to trust Windows products.
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs
OWASP AppSec APAC 2012 The OWASP Foundation http://www.owasp.org Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs
Bugzilla ID: Bugzilla Summary:
Bugzilla ID: Bugzilla Summary: CAs wishing to have their certificates included in Mozilla products must 1) Comply with the requirements of the Mozilla CA certificate policy (http://www.mozilla.org/projects/security/certs/policy/)
CA-DAY 2014. Michael Kranawetter, Chief Security Advisor (Tom Albertson, Security Program Manager) Microsoft
CA-DAY 2014 Michael Kranawetter, Chief Security Advisor (Tom Albertson, Security Program Manager) Microsoft Microsoft s Root Program in 2014 New Technical Requirements Published in November 2013 First
Analysis of the HTTPS Certificate Ecosystem
Analysis of the HTTPS Certificate Ecosystem, James Kasten, Michael Bailey, J. Alex Halderman University of Michigan HTTPS and TLS How does HTTPS and the CA ecosystem fit into our daily lives? Nearly all
Websense Content Gateway HTTPS Configuration
Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco
Extended SSL Certificates
Introduction Widespread usage of internet has led to the growth of awareness amongst users, who now associate green address bar with security. Though people are able to recognize the green bar, there is
Basics of SSL Certification
Introduction To secure transmission of information from browser to a web server, a security protocol is used. SSL (Secure Socket Lock) is one of the most popular and widely accepted security protocols,
ARPKI: Attack Resilient Public-Key Infrastructure
ARPKI: Attack Resilient Public-Key Infrastructure David Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski ETH Zurich, University of Oxford, CMU 1 PUBLIC KEYS AND CERTIFICATES
Introduction to the DANE Protocol
Introduction to the DANE Protocol ICANN 47 July 17, 2013 Internet Society Deploy360 Programme Providing real-world deployment info for IPv6, DNSSEC, routing and other Internet technologies: Case Studies
SSL/TLS: The Ugly Truth
SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography
Securing End-to-End Internet communications using DANE protocol
Securing End-to-End Internet communications using DANE protocol Today, the Internet is used by nearly.5 billion people to communicate, provide/get information. When the communication involves sensitive
SSL Interception Proxies. Jeff Jarmoc Sr. Security Researcher Dell SecureWorks. and Transitive Trust
SSL Interception Proxies Jeff Jarmoc Sr. Security Researcher Dell SecureWorks and Transitive Trust About this talk History & brief overview of SSL/TLS Interception proxies How and Why Risks introduced
AllSeen Summit 2015: IoT: Taking PKI Where No PKI Has Gone Before Presented by: Scott Rea DigiCert Sr. PKI Architect ALLSEEN ALLIANCE
AllSeen Summit 2015: IoT: Taking PKI Where No PKI Has Gone Before Presented by: Scott Rea DigiCert Sr. PKI Architect Agenda Slide Title 3 Trust and PKI 9 Web Security - PKI example 26 Traditional PKI Principles
CA Self-Governance: CA / Browser Forum Guidelines and Other Industry Developments. Ben Wilson, Chair, CA / Browser Forum
CA Self-Governance: CA / Browser Forum Guidelines and Other Industry Developments Ben Wilson, Chair, CA / Browser Forum Chronology of Frameworks 1995-1996 PKIX chartered, BS 7799 published, EU Recommendation
Breaking the Myths of Extended Validation SSL Certificates
BlackHat Briefings, 2009 Breaking the Myths of Extended Validation SSL Certificates Alexander Sotirov phmsecurity.com Mike Zusman intrepidusgroup.com Introduction Chosen-prefix MD5 collisions allowed us
Frequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet
FREQUENTLY ASKED QUESTIONS: SECURING THE FUTURE OF TRUST ON THE INTERNET Frequently Asked Questions Frequently Asked Questions: Securing the Future of Trust on the Internet Securing the Future of Trust
PKI : state of the art and future trends
PKI : state of the art and future trends David Chadwick [email protected] 25 Sept 2013 2010-13 TrueTrust Ltd 1 Contents Review of X.509 state of the art to date What is new in X.509 (2016) What
ITL BULLETIN FOR JULY 2012. Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance
ITL BULLETIN FOR JULY 2012 Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance Paul Turner, Venafi William Polk, Computer Security Division, Information
Prioritizing Trust: Certificate Authority Best Practices
WHITE PAPER: PRIORITIZING TRUST: CERTIFICATE AUTHORITY BEST PRACTICES White Paper Prioritizing Trust: Certificate Authority Best Practices A Policy for Commercial Certificate Authorities Prioritizing Trust:
Wildcard and SAN: Understanding Multi-Use SSL Certificates
Wildcard and SAN: Understanding Multi-Use SSL Certificates LEVERAGING MULTI-USE DIGITAL CERTIFICATES TO SIMPLIFY CERTIFICATE MANAGEMENT AND REDUCE COSTS Wildcard and SAN: Understanding Multi-Use SSL Certificates
SSL: Paved With Good Intentions. Richard Moore [email protected]
SSL: Paved With Good Intentions Richard Moore [email protected] Why do we need SSL? Privacy Online shopping Online banking Identity Protection Data Integrity Early SSL First public version was SSLv2
ENTRUST CLOUD. SSL Digital Certificates, Discovery & Management +1-888-690-2424. [email protected] entrust.com
ENTRUST CLOUD SSL Digital Certificates, Discovery & Management +1-888-690-2424 [email protected] entrust.com Entrust Cloud SSL Digital Certificates, Discovery & Management Digital certificates have emerged
SSL Certificates: A Simple Solution to Website Security
SSL Certificates: A Simple Solution to Website Security SSL Certificates: A Simple Solution to Website Security 2 Secure Sockets Layer (SSL) Certificates, also known as digital certificates, assure you
Gain a New Level of Trust with Extended Validation SSL Certificates
Gain a New Level of Trust with Extended Validation SSL Certificates Higher Standard for SSL Certificates Malicious Internet activities such as phishing and pharming have victimized millions of people.
HTTPS Inspection with Cisco CWS
White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a
Breaking the Security Myths of Extended Validation SSL Certificates
Breaking the Security Myths of Extended Validation SSL Certificates Alexander Sotirov phreedom.org Mike Zusman intrepidusgroup.com Introduction SSL certificate authorities have been thoroughly broken in
More on SHA-1 deprecation:
Dear PTC Axeda Customer, This message specifies Axeda and IDM Agent upgrade requirements and timelines for transitioning Axeda Enterprise Server, Global Access Server (GAS), Policy Server, and Questra
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
BEGINNERS GUIDE TO SSL CERTIFICATES: Making the BEST choice when considering your online security options
BEGINNERS GUIDE TO SSL CERTIFICATES: Making the BEST choice when considering your online security options BEGINNERS GUIDE TO SSL CERTIFICATES Introduction Whether you are an individual or a company, you
SSL Certificates and Bomgar
SSL Certificates and Bomgar 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
extended validation SSL certificates: a standard for trust THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES
extended validation SSL certificates: a standard for trust THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES EXTENDED VALIDATION SSL CERTIFICATES: A STANDARD FOR TRUST...1 Who Do You Trust?...1 The
Analysis of the Global SSL Certificate Market. The Growing Need for Value-added Solutions
Analysis of the Global SSL Certificate Market The Growing Need for Value-added Solutions March 2013 Contents Section Slide Numbers Executive Summary 8 Market Overview 14 Total SSL Certificate Market -
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment Dan York, CISSP Senior Content Strategist, Internet Society Eurasia Network Operators' Group (ENOG) 4 Moscow, Russia October
CERTIFICATION PRACTICE STATEMENT UPDATE
CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.
A Proper Foundation: Extended Validation SSL
A Proper Foundation: Extended Validation SSL A critical model for SSL digital certificates and browser trust Get this White Paper Entrust, Inc. All Rights Reserved. 1 1 Contents Context of Internet Security...
State of PKI for SSL/TLS
State of PKI for SSL/TLS NIST Workshop on Improving Trust in the Online Marketplace Russ Housley Vigil Security, LLC Introduction State of the PKI for SSL/TLS: Mostly working, but too fragile Facing motivated
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Best Practice Guide (SSL Implementation) for Mobile App Development 最 佳 行 事 指 引. Jointly published by. Publication version 1.
Best Practice Guide (SSL Implementation) for Mobile App Development 流 動 應 用 程 式 (SSL 實 施 ) 最 佳 行 事 指 引 香 港 電 腦 事 故 協 調 中 心 ] Jointly published by [ 專 業 資 訊 保 安 協 會 ] Hong Kong Computer Emergency Response
Cisco ISE and Certificates. How to Implement Cisco ISE and Server Side Certificates
Cisco ISE and Certificates How to Implement Cisco ISE and Server Side Certificates Table of Contents Certificate Usage... 3 So, what is a certificate?... 3 Determine if a Trusted Authority has Signed the
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices
SESSION ID: MBS-R03 Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices Andrew Blaich, PhD Lead Security Analyst Bluebox Security @ablaich Who are you trusting? How much trust
Is Your SSL Website and Mobile App Really Secure?
Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電
NIST ITL July 2012 CA Compromise
NIST ITL July 2012 CA Compromise Prepared for: Intelligent People [email protected] 1 NIST ITL Bulletin on CA Compromise http://csrc.nist.gov/publications/nistbul/july-2012_itl-bulletin.pdf These
Industry Leading Encryption Balanced Offerings from domain validated to secure EV certificates Mobile Device Capability Full Service and Support
Be the Trusted Security Provider Our Customers Need The demand for online security products is greater than ever due in part to the prevalence of cybercrime in the news headlines. Given the nature of their
Extended Validation SSL Certificates
Extended Validation SSL Certificates A NEW STANDARD TO INSPIRE TRUST, improve confidence and increase sales... INDEX 1. Extended Validation (EV) SSL Certificates solving a trust problem 2. Traditional
SSL Certificates 101
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer
Certificates. Noah Zani, Tim Strasser, Andrés Baumeler
Certificates Noah Zani, Tim Strasser, Andrés Baumeler Overview Motivation Introduction Public Key Infrastructure (PKI) Economic Aspects Motivation Need for secure, trusted communication Growing certificate
Running head: SSL CERTIFICATE AUTHORITY ISSUES 1. Investigating Implementations Designed. to Resolve SSL Certificate Authority Issues.
Running head: SSL CERTIFICATE AUTHORITY ISSUES 1 Investigating Implementations Designed to Resolve SSL Certificate Authority Issues Michael Ham Stefani Kokel Josh Stroschein Dakota State University SSL
Search for Trust: An Analysis and Comparison of CA System Alternatives and Enhancements
1 Search for Trust: An Analysis and Comparison of CA System Alternatives and Enhancements Alexandra C. Grant Senior Honors Thesis Advisor: Charles C. Palmer Dartmouth Computer Science Technical Report
Web Presence Security
Web Presence Security Web Presence Security 2 Getting your business online is about reaching out and connecting with millions of potential customers, buyers, and partners. Building a website is the most
Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions
A Fundamental Requirement for Internet Transactions May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
BEGINNER S GUIDE TO SSL CERTIFICATES: Making the best choice when considering your online security options
BEGINNER S GUIDE TO SSL CERTIFICATES: Making the best choice when considering your online security options BEGINNERS GUIDE TO SSL CERTIFICATES Introduction Whether you are an individual or a company, you
Leveraging Symantec CIC and A10 Thunder ADC to Simplify Certificate Management
Leveraging Symantec CIC and A10 Thunder ADC to Simplify Certificate Management Identify, Monitor and Manage All SSL Certificates Present Datasheet: Leveraging Symantec CIC and A10 Thunder ADC The information
Independent Accountants Report
KPMG LLP 1601 Market Street Philadelphia, PA 19103-2499 Independent Accountants Report To the Management of Unisys Corporation: We have examined the assertion by the management of Unisys Corporation (
Overview of Extended Validation (EV) SSL
Extended Validation SSL Order Guide 1 Ordering Guide for Extended Validation SSL 1. Vetting Preparation 2. CSR Generation 3. Online Ordering Process 4. Vetting Process 5. Receiving & Installing your Certificate
Overview. Comodo Certificate Manager
Overview Comodo Certificate Manager SSL CERTIFICATE MANAGEMENT Streamlined Tracking and Management of Enterprise Certificate Lifecycles, Security and Compliance Loss of control over SSL certificate inventory
Wildcard and SAN: Understanding multi-use SSL Certificates
WHITE PAPER: WILDCARD AND SAN: UNDERSTANDING MULTI-USE SSL CERTIFICATES White paper Wildcard and SAN: Understanding multi-use SSL Certificates Leveraging multi-use digital certificates to simplify certificate
Protecting Your Name on the Internet The Business Benefits of Extended Validation SSL Certificates
Protecting Your Name on the Internet The Business Benefits of Extended Validation SSL Certificates 2008 Copyright Godaddy. All rights Reserved Page 1 Contents 1. Where We Are Now...3 2. How SSL Certificates
SSL Report: ebfl.srpskabanka.rs (91.240.6.48)
Home Projects Qualys.com Contact You are here: Home > Projects > SSL Server Test > SSL Report: (91.240.6.48) Assessed on: Sun, 03 Jan 2016 15:46:07 UTC HIDDEN Clear cache Scan Another» Summary Overall
Publicly trusted certification authorities (CAs) confirm signers identities and bind their public key to a code signing certificate.
Code Signing Code signing is the process of digitally signing executables and scripts to confirm the identity of the software author and guarantee that the code has not been altered or corrupted since
ETSI TR 103 123 V1.1.1 (2012-11)
TR 103 123 V1.1.1 (2012-11) Technical Report Electronic Signatures and Infrastructures (ESI); Guidance for Auditors and CSPs on TS 102 042 for Issuing Publicly-Trusted TLS/SSL Certificates 2 TR 103 123
EMET 4.0 PKI MITIGATION. Neil Sikka DefCon 21
EMET 4.0 PKI MITIGATION Neil Sikka DefCon 21 ABOUT ME Security Engineer on MSRC (Microsoft Security Response Center) I look at 0Days EMET Developer I enjoy doing security research on my free time too:
Realize Greater Profits As An Authorized Reseller Of Network Solutions nsprotect Secure SSL Certificates
Network Solutions Secure Services Realize Greater Profits As An Authorized Reseller Of Network Solutions nsprotect Secure s The Federal Trade Commission (FTC) estimates that 3.2 million US citizens every
DNS security: poisoning, attacks and mitigation
DNS security: poisoning, attacks and mitigation The Domain Name Service underpins our use of the Internet, but it has been proven to be flawed and open to attack. Richard Agar and Kenneth Paterson explain
DigiCert: Trusted Business for the Enterprise and Its Customers
DigiCert: Trusted Business for the Enterprise and Its Customers A leading online trust provider, DigiCert offers multiple products to suit the security needs of enterprises within the finance, healthcare,
Deploying DNSSEC: From End-Customer To Content
Deploying DNSSEC: From End-Customer To Content March 28, 2013 www.internetsociety.org Our Panel Moderator: Dan York, Senior Content Strategist, Internet Society Panelists: Sanjeev Gupta, Principal Technical
beginners guide Beginners Guide Certificates the best decision when considering your online security options.
Beginners Guide to Digital SSL Certificates the best decision when considering your online security options. Beginners Guide to Digital SSL Certificates introduction Whether you are an individual or a
Installation and usage of SSL certificates: Your guide to getting it right
Installation and usage of SSL certificates: Your guide to getting it right So, you ve bought your SSL Certificate(s). Buying your certificate is only the first of many steps involved in securing your website.
A Study of What Really Breaks SSL HITB Amsterdam 2011
A Study of What Really Breaks SSL HITB Amsterdam 2011 v1.0 Ivan Ristic Michael Small 20 May 2011 Agenda 1. State of SSL 2. Quick intro to SSL Labs 3. SSL Configuration Surveys 4. Survey of Actual SSL Usage
WEBTRUST FOR CERTIFICATION AUTHORITIES SSL BASELINE REQUIREMENTS AUDIT CRITERIA V.1.1 [Amended 1 ] CA/BROWSER FORUM
WEBTRUST FOR CERTIFICATION AUTHORITIES SSL BASELINE REQUIREMENTS AUDIT CRITERIA V.1.1 [Amended 1 ] BASED ON: CA/BROWSER FORUM BASELINE REQUIREMENTS FOR THE ISSUANCE AND MANAGEMENT OF PUBLICLY-TRUSTED CERTIFICATES,
GeoTrust Extended Validation SSL and Customer Confidence
GeoTrust Extended Validation SSL and Customer Confidence Introduction Suspicion, doubt, reluctance, abandonment, and in some cases refusal to shop online at all anymore are growing characteristics among
Possible conflict between Microsoft Root Certification Technical Requirement V 2.0 and CABF Baseline Requirement about extendedkeyusage
Possible conflict between Microsoft Root Certification Technical Requirement V 2.0 and CABF Baseline Requirement about extendedkeyusage Chunghwa Telecom Co., Ltd. Li-Chun CHEN, Engineer, CISSP, CISM, CISA,
Next Steps In Accelerating DNSSEC Deployment
Next Steps In Accelerating DNSSEC Deployment Dan York, CISSP Senior Content Strategist, Internet Society DNSSEC Deployment Workshop, ICANN 45 Toronto, Canada October 17, 2012 Internet Society Deploy360
Beginner s Guide to SSL Certificates
WHITE PAPER: BEGINNER S GUIDE TO SSL CERTIFICATES White Paper Beginner s Guide to SSL Certificates Making the Best Choice When Considering Your Online Security Options Beginner s Guide to SSL Certificates
Internal Server Names and IP Address Requirements for SSL:
Internal Server Names and IP Address Requirements for SSL: Guidance on the Deprecation of Internal Server Names and Reserved IP Addresses provided by the CA/Browser Forum June 2012, Version 1.0 Introduction
BEGINNERS GUIDE BEGINNERS GUIDE TO SSL CERTIFICATES: MAKING THE BEST CHOICE WHEN CONSIDERING YOUR ONLINE SECURITY OPTIONS
BEGINNERS GUIDE TO SSL CERTIFICATES: MAKING THE BEST CHOICE WHEN CONSIDERING YOUR ONLINE SECURITY OPTIONS BEGINNERS GUIDE TO SSL CERTIFICATES INTRODUCTION Whether you are an individual or a company, you
IPv4 Shortage Multiple SSL Certificates on a single IP address
GlobalSign. A GMO Internet Inc group company. IPv4 Shortage Multiple SSL Certificates on a single IP address Paul van Brouwershaven EMEA Business Development Director GLOBALSIGN SOLUTIONS Visible Trust
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
