PKI Flashcards

1
Q

X509

A

Defines Structure for public key certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trust Root model

A

monopoly model: single root of trust
oligarchy model: numerous roots of trust
SCION: Per-domain trust root configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Approaches to improve TLS

A
  • Let’s Encrypt
  • Extended Validation
  • HTTP Strict Transport Security (HSTS)
  • Certificate Revocation List (CRL)
  • Online Certificate Status Protocol (OCSP)
  • DNS Based Authentication of Named Entities (DANE)
  • HTTP Public-Key Pinning
  • Certificate Transparency (CT)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Let’s Encrypt

A

provide free cer1ficates with automatic domain validation, issuance, and renewal
ISSUE: prefix hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HSTS

A

HTTP Strict Transport Security: allows servers to declare that their clients should only use HTTPS (for a specified period)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HPKP

A

The server sends a set of public keys to the client. These keys should be the only ones used for connections to this domain.
ISSUES:
- Trust on First use
- Lost keys
- Pinning renewal before max age is reached can end up in self DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Certificate Revocation

A
  • After a private key is disclosed
  • Trusted employee / administrator leaves corporation
  • Certificate expiration time is usually chosen too long (updating certificates is a lot of work)
    ISSUE: CAP theorem Consistency, Availability and Partition tolerance not all possible.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OCSP

A
Online Certificate Status Protocol to verify certificate status, ensure certificate is valid and has not been revoked.
ISSUES:
- Optimistic treatment of OCSP failure
- OCSP can leak browsing information
Solution: OCSP stapling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OCSP Stapling:

A

Server gets signed-timestamped OCSP response from CA and verifies the validity of the cert to the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DANE

A

DNS-Based Authentication of Named Entities, Use DNS Sec to bind certificates to names
1. CA constraints: clients should only accept certs by these CAs
2. Cert constraints: clients should only accept this cert
3. Trust anchor assertion: clients should use domain-provided trust anchor to validate certificates for that domain
ISSUE: heavy reliance on dnssec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Certificate Transparency CT

A

make cert public knowledge and hold CAs accountable. CT log is add only (Merkle Tree)
- log can be cryptographically verified (Merkle Tree)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARPKI

A
  • Domains obtain cert with mult signatures from different CAs
    Integrity Log Server(ILS) logs domains certificates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SCT

A

Signed certificate timestamp

  • issued by log server as promise to add cert to the log
  • is used by domain owner to show validity of cert, before cert is added to log
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

problems of SCT with malicious log and CA

A
  • log can issue SCT without adding it to the log, and therefore convince client that cert is valid.
  • can be detected by client or CA by checking in retrospect if cert was added
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

branched log attack

A

log server adds cert to log view 1 but not log view 2. the log server replies with view 1 to client but with view 2 to CA. CA will not detect any forged certs and client accepts cert as valid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

privacy problem of log server

A

log server knows all domains a client wants to access