NCSC conference, january 23, 2013 Marco Davids Technical Advisor. DANE, the next big thing (after DNSSEC)
|
|
|
- Martin Hines
- 10 years ago
- Views:
Transcription
1 NCSC conference, january 23, 2013 Marco Davids Technical Advisor DANE, the next big thing (after DNSSEC) 1
2 SIDN Foundation for Internet Domain Registration in the Netherlands (SIDN) Registry for.nl 2
3 .nl in figures Top 10 cctld s 1.DE (Germany) 15,2 m 2.TK (Tokalau) 10,8 m 3.UK (United kingdom) 10,2 m 4.NL (Netherlands) 5 m 5. CN (PR of China) 4,1 m 6.RU (Russian Fed.) 4 m 7.EU (European Union) 3,67 m 8. BR (Brazil) 3 m 9. AR (Argentine) 2,7 m 10.AU (Australia) 2,5 m (source: CENTR, sept 2012) (source: SIDN) 3
4 .nl today High domain density 1 th TLD in terms of DNSSEC 4
5 The problem 5
6 PKI system drawbacks: Complex Lack of quality Architectural weaknesses Implementation issues But, more important (in this context) 6
7 PKI system drawbacks User confusion Problems with CA s 7
8 PKI: SSL/TLS 8
9 Where do you pay attention to in your browser? And what about your mobile device? 9
10 Many CA s A-Trust-nQual-03 Chambers of Commerce Root Global Chambersign Root Chambers of Commerce Root Global Chambersign Root Actalis Authentication Root CA AddTrust Class 1 CA Root AddTrust External CA Root AddTrust Public CA Root AddTrust Qualified CA Root AffirmTrust Commercial AffirmTrust Networking AffirmTrust Premium AffirmTrust Premium ECC EC-ACC America Online Root Certification Authority 1 America Online Root Certification Authority 2 Juur-SK EE Certification Centre Root CA 20 10
11 Many CA s Autoridad de Certificacion Firmaprofesional CIF A Autoridad de Certificacion Firmaprofesional CIF A Baltimore CyberTrust Root Buypass Class 2 CA 1 Buypass Class 3 CA 1 Buypass Class 2 Root CA Buypass Class 3 Root CA Certinomis - Autorité Racine 40 Class 2 Primary CA certsign ROOT CA epki Root Certification Authority CNNIC ROOT COMODO ECC Certification Authority AAA Certificate Services Secure Certificate Services Trusted Certificate Services COMODO Certification Authority ComSign Secured CA ComSign CA Cybertrust Global Root Deutsche Telekom Root CA 2 11
12 Many CA s S-TRUST Authentication and Encryption Root CA 2005:PNS Certigna DigiCert Assured ID Root CA DigiCert Global Root CA DigiCert High Assurance EV Root CA [DISABLED] DigiNotar Root CA DST ACES CA X6 Digital Signature Trust Co. Global CA 1 60 Digital Signature Trust Co. Global CA 3 DST Root CA X3 CA Disig EBG Elektronik Sertifika Hizmet Sağlayıcısı ACEDICOM Root e-guven Kok Elektronik Sertifika Hizmet Saglayicisi Entrust Root Certification Authority Entrust.net Secure Server Certification Authority Entrust.net Certification Authority (2048) [DISABLED] Digisign Server ID - (Enrich) Equifax Secure CA Equifax Secure ebusiness CA 2 [DISABLED] MD5 Collisions Inc. ( 12
13 Many CA s Equifax Secure Global ebusiness CA-1 Equifax Secure ebusiness CA-1 Root CA Generalitat Valenciana GeoTrust Global CA GeoTrust Global CA 2 GeoTrust Universal CA GeoTrust Universal CA 2 GeoTrust Primary Certification Authority 80 GeoTrust Primary Certification Authority - G2 GeoTrust Primary Certification Authority - G3 GlobalSign GlobalSign Root CA Go Daddy Root Certificate Authority - G2 Taiwan GRCA GTE CyberTrust Global Root Digisign Server ID (Enrich) Hellenic Academic and Research Institutions RootCA 2011 Hongkong Post Root CA 1 Izenpe.com SecureSign RootCA11 13
14 Many CA s ApplicationCA - Japanese Government Microsec e-szigno Root CA Microsec e-szigno Root CA 2009 NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado NetLock Kozjegyzoi (Class A) Tanusitvanykiado NetLock Uzleti (Class B) Tanusitvanykiado NetLock Expressz (Class C) Tanusitvanykiado NetLock Arany (Class Gold) Főtanúsítvány 100 Network Solutions Certificate Authority IGC/A QuoVadis Root Certification Authority QuoVadis Root CA 2 QuoVadis Root CA 3 RSA Security 2048 v3 Security Communication RootCA2 Security Communication EV RootCA1 Security Communication Root CA SecureTrust CA Secure Global CA AC Raíz Certicámara S.A. 14
15 Many CA s Sonera Class1 CA Sonera Class2 CA Staat der Nederlanden Root CA Staat der Nederlanden Root CA - G2 Starfield Class 2 CA Starfield Root Certificate Authority - G2 Starfield Services Root Certificate Authority - G2 StartCom Certification Authority 120 StartCom Certification Authority StartCom Certification Authority G2 Swisscom Root CA 1 SwissSign Platinum CA - G2 SwissSign Gold CA - G2 SwissSign Silver CA - G2 T-TeleSec GlobalRoot Class 3 TWCA Root Certification Authority TC TrustCenter Class 2 CA II TC TrustCenter Class 3 CA II TC TrustCenter Universal CA I TC TrustCenter Universal CA III TDC OCES CA 15
16 Many CA s TDC Internet Root CA Thawte Server CA Thawte Premium Server CA thawte Primary Root CA thawte Primary Root CA - G2 thawte Primary Root CA - G3 140 Go Daddy Class 2 CA UTN-USERFirst-Network Applications UTN - DATACorp SGC UTN-USERFirst-Client Authentication and UTN-USERFirst-Hardware UTN-USERFirst-Object Trustis FPS Root CA TÜBİTAK UEKAE Kök Sertifika Hizmet Sağlayıcısı - Sürüm 3 TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı Certum CA Certum Trusted Network CA 16
17 Many CA s VeriSign Class 3 Public PCA - G5 VeriSign Class 3 Public PCA VeriSign Class 1 Public PCA VeriSign Class 1 Public PCA G2 VeriSign Class 3 Public PCA - G4 VeriSign Class 2 Public PCA G2 VeriSign Class 3 Public PCA G2 VeriSign Class 1 Public PCA - G3 VeriSign Class 2 Public PCA - G3 VeriSign Class 3 Public PCA - G3 VeriSign Class 4 Public PCA - G3 VeriSign Universal Root Certification Authority Visa ecommerce Root Wells Fargo Root Certificate Authority WellsSecure Public Root Certificate Authority OISTE WISeKey Global Root GA CA XRamp Global Certification Authority 160 Source: 17
18 Bottom line: o o o o o There are many CA s ( Certificate Authorities ) There is risk of are bad apples No proper way of matching certificate with website No easy way to trust some CA s more than others Unclear for Mr. Joe Average 18
19 Solution? o o o o o Certificate pinning Not really scalable, but it saved Google s butt a number of times Notaries (like converge.io ) No uniform standard Not very user-friendly 19
20 How DANE helps 20
21 The goal of DANE is to use the DNS (and DNSSEC) to provide clients with additional information about the cryptographic credentials associated with a domain DNS-Based Authentication of Named Entities 21
22 The problem in pictures! ClientHello 22
23 Handshake ServerHello? Is the certificate valid? Yes/No If Yes: proceed with handshake If No, abort with a warning A valid certificate Is not expired or revoked Validates with one of the many CA s Has a matching common name 23
24 Man-in-the-Middle ServerHello ServerHello 24
25 Man-in-the-Middle ServerHello ServerHello The (fake) certificate is Not expired or revoked Validates with one of the many CA s Has a matching common name 25
26 Man-in-the-Middle ServerHello ServerHello The (fake) certificate is Not expired or revoked Validates with one of the many CA s Has a matching common name 26
27 DANE to the rescue ServerHello ServerHello 27
28 DNS query for TLSA record ServerHello ServerHello? 28
29 Does it match? ServerHello ServerHello _443._tcp. IN TLSA ( d2abde240d7cd3ee6b4b28c54df034b9 7983a1d16e8a410e4561cb106618e971 ) 29
30 Genuine certificate matches the TLSA, fake certificate does not == _443._tcp. IN TLSA ( d2abde240d7cd3ee6b4b28c54df034b9 7983a1d16e8a410e4561cb106618e971 )!= _443._tcp. IN TLSA ( d2abde240d7cd3ee6b4b28c54df034b9 7983a1d16e8a410e4561cb106618e971 ) 30
31 Genuine certificate matches the TLSA, fake certificate does not == _443._tcp. IN TLSA ( d2abde240d7cd3ee6b4b28c54df034b9 7983a1d16e8a410e4561cb106618e971 )!= _443._tcp. IN TLSA ( d2abde240d7cd3ee6b4b28c54df034b9 7983a1d16e8a410e4561cb106618e971 ) 31
32 Without DANE _443._tcp. IN TLSA ( d2abde240d7cd3ee6b4b28c54df034b9 7983a1d16e8a410e4561cb106618e971 )? _443._tcp. IN TLSA ( d2abde240d7cd3ee6b4b28c54df034b9 7983a1d16e8a410e4561cb106618e971 ) 32
33 Without DANE both certificates would have been accepted _443._tcp. IN TLSA ( d2abde240d7cd3ee6b4b28c54df034b9 7983a1d16e8a410e4561cb106618e971 ) _443._tcp. IN TLSA ( d2abde240d7cd3ee6b4b28c54df034b9 7983a1d16e8a410e4561cb106618e971 ) 33
34 DNSSEC _443._tcp. IN TLSA ( d2abde240d7cd3ee6b4b28c54df034b9 7983a1d16e8a410e4561cb106618e971 ) 34
35 DNSSEC _443._tcp. IN TLSA ( d2abde240d7cd3ee6b4b28c54df034b9 7983a1d16e8a410e4561cb106618e971 ) 35
36 DNSSEC the enabling technology _443._tcp. IN TLSA ( d2abde240d7cd3ee6b4b28c54df034b9 7983a1d16e8a410e4561cb106618e971 ) _443._tcp. IN RRSIG TLSA ( example.nl. bnmynbco3mwravvmix7khpuggidpbfmz2icmq0gjz7ud A3tz0EKmBjqxOdwZaZNj2KrtxFJ2ta7elURYIHTpFFl9 +hjftpebjlklj636ilcyqcsxaytleiu7vop2nnx8y6+m g+toku4xnpk/hsolelmia+zxkj8zxj+yxdedulo= ) 36
37 Current status 37
38 DANE standard IETF RFC6698 (august 2012) Early adopter stage Tools to generate TLSA records Support in BIND and up Support in various other software 38
39 DANE standard No widespread use of it (yet) Mozilla / Google Chrome are looking into it and experimenting Add-ons / extensions exist 39
40 DANE standard DANE patrol By CZ.NIC labs (fork of Certificate Patrol ) 40
41 DANE standard DNSSEC/TLSA validator By Paul Wouters (based on work done by CZ.NIC and D. Groenewegen) 41
42 Hype cycle by courtesy of: SURFnet 42
43 Hype cycle by courtesy of: SURFnet 43
44 The state of DNSSEC Uptake of DNSSEC signed domains in.com,.net,.edu.edu : 0.9%.net : 0.2 %.com: 0.15 % source: Verisign labs 44
45 The state of DNSSEC Uptake of DNSSEC signed domains in.nl,.cz,.br and.se For.nl it is 26%! source: PowerDNS 45
46 The state of DNSSEC validation Worldwide ~4% DNSSEC validation source: Verisign labs 46
47 The state of DNSSEC validation Some countries are doing really well source: RIPE labs / Geoff Huston 47
48 Wrap up 48
49 Wrap up o o o o o o o o DANE adds additional layer of security to the PKI The standard is ratified by the IETF DANE is easy to implement, without much risk DNSSEC is required DNSSEC adoption is well on it s way Early adopters are already playing with it Browser-vendors are interested Things are looking good! 49
50 THANK YOU 50
Websense Email Security Gateway Encryption
Websense Email Security Gateway Encryption Topic 70034 Email Encryption Email Security Gateway Updated: 22-January-2013 Applies To: Websense Email Security Gateway 7.6.x and later Websense Email Security
Global Chambersign Root 2003 Sep 30 2037 Sep 30 2048 SHA-1 Websites Email Code
Certificate Authorities that are BuiltIn Object Tokens Firefox Version: 3.5.1 The Approval Bug # column shows the bug number in which approval was achieved based on the Mozilla Policy. Bug numbers that
Websense TRITON AP-EMAIL Message Encryption
Websense TRITON AP-EMAIL Message Encryption Topic 70133 Email Encryption TRITON AP-EMAIL Updated: 02-Feb-2015 Applies To: TRITON AP-EMAIL v8.0 Websense TRITON AP-EMAIL facilitates the secure transmission
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices
SESSION ID: MBS-R03 Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices Andrew Blaich, PhD Lead Security Analyst Bluebox Security @ablaich Who are you trusting? How much trust
Internet SSL Survey 2010! Black Hat USA 2010
Internet SSL Survey 2010! Black Hat USA 2010 Ivan Ristic Director of Engineering, Web Application Firewall and SSL [email protected] / @ivanristic July 29th, 2010 (v1.6) Agenda 1. Why do we care about
Information on secure e-mail communication. ALDI SOUTH group
Information on secure e-mail communication ALDI SOUTH group Secure e-mail communication Introduction Nowadays, e-mail is a common means of communication. Businesses widely use e-mails to exchange information.
WEB SERVICES CERTIFICATE GUIDE
WEB SERVICES CERTIFICATE GUIDE 1. Purpose The purpose of this document is to provide information to internal and external users who want to access an era Web Service using the certificate based authentication
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment Dan York, CISSP Senior Content Strategist, Internet Society Eurasia Network Operators' Group (ENOG) 4 Moscow, Russia October
Comodo Certification Practice Statement
Comodo Certification Practice Statement Comodo CA, Ltd. Version 3.0 22 September 2006 3rd Floor, Office Village, Exchange Quay, Trafford Road, Salford, Manchester, M5 3EQ, United Kingdom Tel: +44 (0) 161
ECC Certificate Addendum to the Comodo EV Certification Practice Statement v.1.03
ECC Certificate Addendum to the Comodo EV Certification Practice Statement v.1.03 Comodo CA, Ltd. ECC Certificate Addendum to Comodo EV CPS v. 1.03 6 March 2008 3rd Floor, Office Village, Exchange Quay,
Global SSL Certification Market 2014-2018
Brochure More information from http://www.researchandmarkets.com/reports/3022246/ Global SSL Certification Market 2014-2018 Description: About SSL Certification SSL Security is a protocol for secure transmission
Do you TRUST me? Author: Bill Corbitt http://www.linkedin.com/in/bulwarkz
Author: Bill Corbitt http://www.linkedin.com/in/bulwarkz Abstract: This paper analyzes several recent breaches of major players in the security industry, in particular security products vendors and Certificate
Boundary Encryption Service. MTA Setup Guide
Boundary Encryption Service MTA Setup Guide Boundary Encryption MTA Setup Guide Documentation version: 2.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,
Introduction to the DANE Protocol
Introduction to the DANE Protocol ICANN 47 July 17, 2013 Internet Society Deploy360 Programme Providing real-world deployment info for IPv6, DNSSEC, routing and other Internet technologies: Case Studies
Public Key Infrastructures
Public Key Infrastructures Ralph Holz Network Architectures and Services Technische Universität München November 2014 Ralph Holz: Public Key Infrastructures 1 Part 2: Recent results or: the sorry state
SSL and Browsers: The Pillars of Broken Security
SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the
Siemens PKI Certificate Authority (CA) Hierarchy
Siemens PKI Certificate Authority (CA) Hierarchy Status July 2011 Siemens PKI CA Hierarchy Overview (1) Public Root (available in common OS / Browsers) Baltimore CyberTrust Root (Verizon) Siemens Trust
An Observatory for the SSLiverse. Peter Eckersley, Jesse Burns
An Observatory for the SSLiverse Peter Eckersley, Jesse Burns Defcon 18, Las Vegas, USA July, 2010 Quick overview Electronic Frontier Foundation, funded by NL Net with volunteer help from isec Partners
Securing End-to-End Internet communications using DANE protocol
Securing End-to-End Internet communications using DANE protocol Today, the Internet is used by nearly.5 billion people to communicate, provide/get information. When the communication involves sensitive
Windows Mobile SSL Certificates
Windows Mobile SSL Certificates Configuring Security Enhanced Communication on Exchange Server 2003 SP2 or 2007 with Windows Mobile Powered Devices White Paper Published: May 2007 For the latest information,
Support Advisory: ArubaOS Default Certificate Expiration
Support Advisory: ArubaOS Default Certificate Expiration Issued February 14, 2011 Updated April 8, 2011 This document, including the information it contains and the programs made available through the
Creating Trust Online TM. Identity & Trust Assurance in a changing standards environment. *(Extended Validation)
Creating Trust Online TM Identity & Trust Assurance in a changing standards environment. *(Extended Validation) Introduction Today, online commerce is worth an estimated US $1 trillion and continues to
ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB
ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB Scott Rea DigiCert, Inc. Session ID: SEC-T02 Session Classification: Intermediate BACKGROUND: WHAT IS A CERTIFICATION AUTHORITY? What is a certification
SSL/TLS: The Ugly Truth
SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Deploying DNSSEC: From End-Customer To Content
Deploying DNSSEC: From End-Customer To Content March 28, 2013 www.internetsociety.org Our Panel Moderator: Dan York, Senior Content Strategist, Internet Society Panelists: Sanjeev Gupta, Principal Technical
A Step-by-Step guide for implementing DANE with a Proof of Concept
A Step-by-Step guide for implementing DANE with a Proof of Concept Sandoche BALAKRICHENAN, Stephane BORTZMEYER, Mohsen SOUISSI AFNIC R&D {sandoche.balakrichenan, stephane.bortzmeyer, mohsen.souissi}@afnic.fr
3. April 2013 IT ZERTIFIKATE. Zertifizierungsstellen / Certification Center. IT Sicherheit UNTERNEHMENSBEREICH IT
IT Sicherheit UNTERNEHMENSBEREICH IT IT ZERTIFIKATE 3. April 2013 Zertifizierungsstellen / Certification Center D-TRUST D-Trust Root Class 2 CA2007 Aussteller/Issuer: D-TRUST Root Class 2 CA 2007 Gültig
BT Office Anywhere Configuring Mobile Outlook Email Synchronisation with Exchange Server
BT Office Anywhere Configuring Mobile Outlook Email Synchronisation with Exchange Server Contents Page 1 Introduction 3 2 Skill Level 3 3 Requirements 4 4 Enabling Outlook Email on the Mobile Device 5
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Analyzing DANE's Response to Known DNSsec Vulnerabilities
Analyzing DANE's Response to Known DNSsec Vulnerabilities Matthew Henry Joseph Kirik Emily Scheerer UMBC UMBC UMBC [email protected] [email protected] [email protected] May 9, 2014 Abstract: SSL/TLS is currently
CA/Browser Forum. Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, v.1.2.3
CA/Browser Forum Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, v.1.2.3 (Current through adoption of Ballot 135 on 16 October 2014) Copyright 2011-2014, The CA
DNSSEC Applying cryptography to the Domain Name System
DNSSEC Applying cryptography to the Domain Name System Gijs van den Broek Graduate Intern at SURFnet Overview First half: Introduction to DNS Attacks on DNS Second half: DNSSEC Questions: please ask! DNSSEC
DomainWire. Edition 11 Q1 2015. Council of European National Top level Domain Registries - www.centr.org
DomainWire Edition 11 Q1 2015 Global TLD Stat Report DomainWire Stat Report is CENTR s quarterly publication covering status and trends in global top-level domains with a focus on European cctlds (country
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Comodo Certification Practice Statement
Comodo Certification Practice Statement Comodo CA, Ltd. Version 4.0 Effective: 1 July 2012 3rd Floor, Office Village, Exchange Quay, Trafford Road, Salford, Manchester, M5 3EQ, United Kingdom Tel: +44
Why strong Validation processes for SSL are essential for the preservation of trust in the Internet economy
Why strong Validation processes for SSL are essential for the preservation of trust in the Internet economy Weak validation processes undermine the value of SSL as a trust enabling technology Introduction
One year of DANE Tales and Lessons Learned. sys4.de
One year of DANE Tales and Lessons Learned sys4.de DANE secures Security Why secure Security? Encryption Models Opportunistic Encryption > Expect anything > Proceed if absent > Try if offered > Proceed
Introduction to Network Security Key Management and Distribution
Introduction to Network Security Key Management and Distribution Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology [email protected] http://web.mst.edu/~cetinkayae/teaching/cpe5420fall2015
More on SHA-1 deprecation:
Dear PTC Axeda Customer, This message specifies Axeda and IDM Agent upgrade requirements and timelines for transitioning Axeda Enterprise Server, Global Access Server (GAS), Policy Server, and Questra
BEGINNERS GUIDE TO SSL CERTIFICATES: Making the BEST choice when considering your online security options
BEGINNERS GUIDE TO SSL CERTIFICATES: Making the BEST choice when considering your online security options BEGINNERS GUIDE TO SSL CERTIFICATES Introduction Whether you are an individual or a company, you
SSL BEST PRACTICES OVERVIEW
SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%
A Proper Foundation: Extended Validation SSL
A Proper Foundation: Extended Validation SSL A critical model for SSL digital certificates and browser trust Get this White Paper Entrust, Inc. All Rights Reserved. 1 1 Contents Context of Internet Security...
EMET 4.0 PKI MITIGATION. Neil Sikka DefCon 21
EMET 4.0 PKI MITIGATION Neil Sikka DefCon 21 ABOUT ME Security Engineer on MSRC (Microsoft Security Response Center) I look at 0Days EMET Developer I enjoy doing security research on my free time too:
GlobalSign Digital IDs for Adobe AIR Code Signing
GlobalSign Digital IDs for Adobe AIR Code Signing Expanding market reach by distributing trustworthy software over the Internet WHITE PAPER Lila Kee Director of Business Development, GlobalSign Inc TABLE
CA/Browser Forum. Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, v.1.0
CA/Browser Forum Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, v.1.0 Adopted on 22 Nov. 2011 with an Effective Date of 1 July 2012 Copyright 2011, The CA / Browser
The USP Maker for the hosting industry Welcome to my presentation Christian Heutger WorldHostingDay 22.03.2011
The USP Maker for the hosting industry Welcome to my presentation Christian Heutger WorldHostingDay 22.03.2011 PSW GROUP GmbH & Co. KG The USP Maker for the hosting industry! Germany's leading provider
Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.
Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions
Extended SSL Certificates
Introduction Widespread usage of internet has led to the growth of awareness amongst users, who now associate green address bar with security. Though people are able to recognize the green bar, there is
Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C
Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates
Security Model For Windows Mobile 5.0 and Windows Mobile 6. Date February 2007 Applies to: Windows Mobile Version 5.
Security Model For Windows Mobile 5.0 and Windows Mobile 6 Date February 2007 Applies to: Windows Mobile Version 5.0 Windows Mobile 6 The information contained in this document represents the current view
The SSL Landscape. Ralph Holz, Thomas Riedmaier, Lothar Braun, Nils Kammenhuber. Network Architectures and Services Technische Universität München
The SSL Landscape Ralph Holz, Thomas Riedmaier, Lothar Braun, Nils Kammenhuber Network Architectures and Services Technische Universität München Hagenberg, 15 Mar 2012 Ralph Holz, Thomas Riedmaier, Lothar
How to check if I care for the safety of my Clients?
How to check if I care for the safety of my Clients? www.certum.eu Have you considered ways to increase the reliability of your business on the Internet and stand out from the crowd? 72% 91% of Internet
Our partnerships. Our accreditations
Our partnerships Our accreditations Follow us COMODO TRAINING 2014 SSL247 Limited. All rights reserved. SSL247 Limited is registered in England No: 5802692 SUMMARY About Comodo Product Range SSL247 s new
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
Certificates and network security
Certificates and network security Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014 Outline X.509 certificates and PKI Network security basics: threats and goals Secure socket layer
Support Advisory: ArubaOS Default Certificate Expiration
Support Advisory: ArubaOS Default Certificate Expiration Issued October 10, 2013 This document, including the information it contains and the programs made available through the links that it includes,
GlobalSign Customers. Enterprise PKI Client Authentication User Guide. Employing authentication as an additional security layer to the EPKI platform
GlobalSign Customers Enterprise PKI Client Authentication User Guide Employing authentication as an additional security layer to the EPKI platform I. Background information... 3 II. EPKI administrator
GlobalSign Enterprise Solutions
GlobalSign Enterprise Solutions Secure Email & Key Recovery Using GlobalSign s Auto Enrollment Gateway (AEG) 1 v.1.2 Table of Contents Table of Contents... 2 Introduction... 3 The Benefits of Secure Email...
Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs
OWASP AppSec APAC 2012 The OWASP Foundation http://www.owasp.org Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs
www.enterprisessl.com www.comodo.com [email protected] Tel: +1 888 266 6361 Tel: +44 (0) 161 874 7070 2006 Comodo Group.
www.enterprisessl.com www.comodo.com [email protected] Tel: +1 888 266 6361 Tel: +44 (0) 161 874 7070 2006 Comodo Group. The Internet has created many new global business opportunities for enterprises
BEGINNERS GUIDE BEGINNERS GUIDE TO SSL CERTIFICATES: MAKING THE BEST CHOICE WHEN CONSIDERING YOUR ONLINE SECURITY OPTIONS
BEGINNERS GUIDE TO SSL CERTIFICATES: MAKING THE BEST CHOICE WHEN CONSIDERING YOUR ONLINE SECURITY OPTIONS BEGINNERS GUIDE TO SSL CERTIFICATES INTRODUCTION Whether you are an individual or a company, you
High Assurance SSL Sub CA Addendum to the Comodo Certification Practice Statement v.3.0
High Assurance SSL Sub A Addendum to the omodo ertification Practice Statement v.3.0 omodo A, Ltd. High Assurance SSL Sub-A Addendum to Version 3.0 Amendments 21 ctober 2008 3rd Floor, ffice Village, Exchange
Apache Security with SSL Using Ubuntu
Apache Security with SSL Using Ubuntu These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Some SSL background
GlobalSign Integration Guide
GlobalSign Integration Guide GlobalSign Enterprise PKI (EPKI) and AirWatch Enterprise MDM 1 v.1.1 Table of Contents Table of Contents... 2 Introduction... 3 GlobalSign Enterprise PKI (EPKI)... 3 Partner
QualitySSL by BitEngines Nellikevaenget 12 2625 Vallensbaek Denmark. Email: [email protected] WWW: http://www.qualityssl.com/
QualitySSL by BitEngines Nellikevaenget 12 2625 Vallensbaek Denmark Email: [email protected] WWW: http://www.qualityssl.com/ 2002 BitEngines. All Rights Reserved. Introduction Today, online commerce
Next Steps In Accelerating DNSSEC Deployment
Next Steps In Accelerating DNSSEC Deployment Dan York, CISSP Senior Content Strategist, Internet Society DNSSEC Deployment Workshop, ICANN 45 Toronto, Canada October 17, 2012 Internet Society Deploy360
Criminal charges are not pursued: Hacking PKI
Criminal charges are not pursued: Hacking PKI Mike Zusman Principal Consultant [email protected] About the Title From StartCom Critical Event Report https://blog.startcom.org/?p=161 Thanks
Securing your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
A quick overview of the DANE WG. * DNS-based Authentication of Named Entities
A quick overview of the DANE WG * DNS-based Authentication of Named Entities Some background... When you connect to https://www.example.com you use SSL (actually TLS) to secure your connection. Need a
BREAKING HTTPS WITH BGP HIJACKING. Artyom Gavrichenkov R&D Team Lead, Qrator Labs [email protected]
BREAKING HTTPS WITH BGP HIJACKING Artyom Gavrichenkov R&D Team Lead, Qrator Labs [email protected] ABSTRACT OVERVIEW OF BGP HIJACKING GLOBAL AND LOCAL HIJACKING HIJACKING A CERTIFICATE AUTHORITY MITIGATIONS
BEGINNER S GUIDE TO SSL CERTIFICATES: Making the best choice when considering your online security options
BEGINNER S GUIDE TO SSL CERTIFICATES: Making the best choice when considering your online security options BEGINNERS GUIDE TO SSL CERTIFICATES Introduction Whether you are an individual or a company, you
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Secure Socket Layer (SSL) and Transport Layer Security (TLS) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available
Implementing Secure Sockets Layer on iseries
Implementing Secure Sockets Layer on iseries Presented by Barbara Brown Alliance Systems & Programming, Inc. Agenda SSL Concepts Digital Certificate Manager Local Certificate Authority Server Certificates
Enterprise SSL FEATURES & BENEFITS
Enterprise SSL FEATURES & BENEFITS What s included: - Powerful 1024-bit signed RSA certificates - Centralised, web-based administrative portal for certificate management - Dynamically-generated site seal
Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part III-a Contents Part III-a Public-Key Infrastructure (PKI) Definition of a PKI and PKI components PKI Trust Models Digital Certificate, X.509 Certificate Management and Life Cycle Public Key Infrastructure
THE DOMAIN NAME INDUSTRY BRIEF VOLUME 11 ISSUE 1 APRIL 2014
THE DOMAIN NAME INDUSTRY BRIEF VOLUME 11 ISSUE 1 APRIL 2014 THE VERISIGN DOMAIN REPORT AS THE GLOBAL LEADER IN DOMAIN NAMES, VERISIGN REVIEWS THE STATE OF THE DOMAIN NAME INDUSTRY THROUGH A VARIETY OF
beginners guide Beginners Guide Certificates the best decision when considering your online security options.
Beginners Guide to Digital SSL Certificates the best decision when considering your online security options. Beginners Guide to Digital SSL Certificates introduction Whether you are an individual or a
Web Security: Encryption & Authentication
Web Security: Encryption & Authentication Arnon Rungsawang [email protected] Massive Information & Knowledge Engineering Department of Computer Engineering Faculty of Engineering Kasetsart University, Bangkok,
CSC574 - Computer and Network Security Module: Public Key Infrastructure
CSC574 - Computer and Network Security Module: Public Key Infrastructure Prof. William Enck Spring 2013 1 Meeting Someone New Anywhere in the Internet 2 What is a certificate? A certificate makes an association
DANE Secured E-Mail Demonstration. Wes Hardaker Parsons <[email protected]>
DANE Secured E-Mail Demonstration Wes Hardaker Parsons Overview My Background In scope topics Securing E-Mail Requirements Implementing Each Requirement 2 My Background Part of the Network Security
Comodo Extended Validation (EV) Certification Practice Statement
Comodo Extended Validation (EV) Certification Practice Statement Comodo CA, Ltd. Version 1.03 4th June 2007 3rd Floor, 26 Office Village, Exchange Quay, Trafford Road, Salford, Manchester, M5 3EQ, United
Web Security. Crypto (SSL) Client security Server security 2 / 40. Web Security. SSL Recent Changes in TLS. Protecting the Client.
1 / 40 Crypto () Client security Server security 2 / 40 Trusting The Server s Client SET The Failure of SET Aside: The SET Root Certificate The Client s Server Who Issues Web Certificates? Mountain America
Secure Sockets Layer (SSL) / Transport Layer Security (TLS)
Secure Sockets Layer (SSL) / Transport Layer Security (TLS) Brad Karp UCL Computer Science CS GZ03 / M030 19 th November 2014 What Problems Do SSL/TLS Solve? Two parties, client and server, not previously
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
A Study of What Really Breaks SSL HITB Amsterdam 2011
A Study of What Really Breaks SSL HITB Amsterdam 2011 v1.0 Ivan Ristic Michael Small 20 May 2011 Agenda 1. State of SSL 2. Quick intro to SSL Labs 3. SSL Configuration Surveys 4. Survey of Actual SSL Usage
