SSL/TLS Digital Certificate Management
CA – Certificate Authority. Issues certificates
CA needs to be trusted by all parties involved
Root CA certificates pre-installed on devices
Use cases:
Verify identity.
Non-repudiation.
Electronic signatures
Encryption
Certmgr.msc in Windows
Sysinternals SigCheck
Certificate stores built into browsers
Certificate.transparency.dev
Special Certificate Types
SAN – Subject Alternative Name. Use same certificate for multiple services.
Wildcard Certificate – Covers subdomains
Certificate Management Tasks
Install, update, validate root certificates
Install update, revoke user and machine certificates
Manage self-signed certificates
Revoke untrusted certs ASAP
Check certificate status:
CRL (certificate revocation list)
OCSP (Online certificate status protocol)
Utilities: openssl (linux) and certutil (windows)
SSL and TLS
Widely used in security web traffic (HTTPS), but any protocol is supported
Certificate required on the server
SSL 3.0 became TLS 1.0
Only TLS is safe to use (1.2 or 1.3)
Careful with downgrade attacks
Certutil -store
Windows command to list certiifcates
Digicert ssl tools
Last updated