How Certificate Transparency works
MD Akhtaruzzaman
Technical Specialist in Entrust | Cloud | Security | Solution Architect | Problem Solver | Team Player
How CT works
How CT fits into the wider Web PKI ecosystem
Contents:
Certificate Transparency: an ecosystem
Certificates are deposited in public, transparent logs
Certificate logs are append-only ledgers of certificates. Because they're distributed and independent, anyone can query them to see what certificates have been included and when. Because they're append-only, they are verifiable by Monitors. Organisations and individuals with the technical skills and capacity can run a log.
User agents - browsers like Chrome and Safari - help enforce Certificate Transparency.
Logs are cryptographically monitored
Monitors cryptographically check which certificates have been included in logs.
If you subscribe to a CT monitor for your domain, you get updates when precertificates and certificates for those domains are included in any of the logs checked by that monitor. Monitors can be set up and run by anyone
Certificate Transparency: step by step
领英推荐
How Certificate Transparency fits in Web Public Key Infrastructure
What is Web PKI?
CT sits within a wider ecosystem, Web Public Key Infrastructure (Web PKI), which allows secure, encrypted communication that can be set up by non-specialists. Without encryption, communication between servers and browsers can be read by anyone. When the ecosystem works well, that information is private.
When an end user accesses a website that has an HTTPS URL, they’re interacting with Web PKI. It is a system of everything needed to issue, distribute and verify cryptographic keys and certificates, and tie them to the right domain. At the core of the Web PKI are cryptographic keys that enable cryptographic operations like authentication, authorisation and encryption. A certificate is, essentially, a binding of a cryptographic key (in this case a public key) to a web domain by a Certificate Authority (CA).
Why does CT matter to Web PKI?
CT brings transparency to the SSL/TLS certificate system that supports the web. SSL/TLS protocols underpin HTTPS and Web PKI. A lack of transparency weakens the reliability and effectiveness of encrypted connections, which can compromise critical TLS/SSL mechanisms. As a result, they can enable a wide range of security attacks, such as website spoofing, server impersonation, and man-in-the-middle attacks.
How does Web PKI work?
Web PKI depends on a system of public and private keys. This system is called asymmetric cryptography. Something encrypted with one key of a key pair can only be decrypted with the corresponding key: you can share one of these keys as a public key while keeping the other private. This allows for uses like creating digital signatures and securely exchanging other cryptographic keys. TLS’s use of digital certificates employs both these properties. Digital signatures are used to authenticate a certificate, and the public key in a certificate is used to facilitate negotiating which cryptographic key to use when encrypting a session. Find out more about PKI in this blog post.
How do Certificate Authorities participate in Web PKI?
In Web PKI, Certificate Authorities create digital certificates which map public keys to domains on the internet: the CA is used by User Agents to perform this role. To begin, the website owner generates a new key pair and uses that to generate a Certificate Signing Request (CSR) that is used to prove the website operator controls the private key associated with the public key in the request. Next the website owner proves to the CA that they control their domain, there are a couple of different ways for them to do this. The CA can, for example, ask them to create a DNS record with random value demonstrating they control the domain. Once domain control has been verified, the CA takes the public key from the request and places it, along with the verified domains into a digital certificate that is signed by the CA. It is then returned to the website owner. With the certificate and private key in hand, the domain owner can renew and revoke the certificate.
How do Certificate Authorities work?
Web PKI depends on CAs acting as trustworthy gatekeepers by issuing certificates only to the right parties and by avoiding giving additional permissions accidentally to those parties. An important part of how CAs meet these obligations is to design their systems so they are resilient to failure. That is partly achieved by keeping the most important private keys in vault-like facilities to protect them from physical and logical security threats.
These private keys are associated with what are called "root certificates" which are distributed by user agents as "trust anchors" signaling the holders of the associated private keys are trusted to perform this role. These root certificates and their private keys are used to create intermediate CA certificates (sometimes called missing CAs), each with their own private keys, that are used to issue the web server certificates that make TLS on the web work in real time.
A website then provides its certificate and those of its issuers as a "certificate chain" to the user agent, which in turn uses them to verify that the website certificate is associated with one of these "root certificates". The user agent does this by verifying each certificate signature, ensuring the each certificate in the chain was ultimately issued by a certificate authority that the browser trusts. This process is commonly called certificate chain verification. All of this is described in more detail in RFC 5280.
Certificate Transparency
Started by engineers at Google, for the internet.
Result-Oriented Human Resource Management | Human Resource Transformation | Talent Acquisition | Organizational Development | Human Resources Leadership - USA | Canada | India
11 个月Nice article
Cybersecurity Engineer - PKI & Auth | Application Specialist | PKI Enthusiast | Problem Solver
11 个月Thanks for the article. I actually don't know CT is enforced by user agent in step 6 and 7 in what we call normal TLS handshake session. Good time to close this gap ??. Thanks for sharing