Uncertain Certificates

Author: Dr A.R. Peters,


Topic:

A discussion of Public Key Infrastructure (PKI) in the context of SHA-1 certificate hash vulnerabilities.

Publication date:

Original date of publication: 2017-03-15

Content:

  1. Introduction
  2. PKI
  3. Certificates
  4. CA's
    1. Pitfall 1: public CA within
    2. Pitfall 2: reuse CSR
  5. Certificate Revocation
  6. Authentication
    1. Pitfall 3: no Subject check
  7. Identity
  8. Redundancy
  9. Responsibility
    1. Pitfall 4: security in Infrastructure?
    2. Pitfall 5: copy private key
  10. Authorization
    1. Pitfall 6: authentication ≠ authorization
    2. Pitfall 7: public CA's
    3. Pitfall 8: intermediate CA's
    4. Mutual Authentication
  11. No CA's?
  12. SHA-1
  13. Conclusion
  14. Links
Download the PDF.