Skip to main content

Questions tagged [public-key-infrastructure]

A public-key infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). There are three main categories of PKI: Web / SSL certs, corporate networks, and Government ID / ePassport.

1 vote
1 answer
52 views

I have a hard time understanding the OCSP RFC 6960. Two basic questions: Simple: What is the canonically correct way of answering to an OCSP request for an unknown (end-entity) certificate serial ...
StackzOfZtuff's user avatar
0 votes
2 answers
99 views

Suppose I maintain a web server, which supports TLS with X.509 certificate #1. Certificate #1 is getting close to expiration, so I get a new certificate #2 (with a different key pair, of course) and ...
Jason S's user avatar
  • 396
1 vote
1 answer
75 views

I am working for a company and we are investigating how mTLS should work. Since public ca's won't issue in the nearby future the client auth EKU, we have to look for alternatives. When searching on ...
J. Doe's user avatar
  • 115
0 votes
2 answers
132 views

I am working for a company who has to change the current mTLS setup because public CA's won't issue the client auth extension anymore, which is required to setup mTLS. We are currently demanding from ...
J. Doe's user avatar
  • 115
0 votes
2 answers
201 views

I'm building a private PKI for IoT devices and want to understand certificate chain validation when an intermediate CA expires. My CA Structure Root CA: 30 years (2025-2055) └── Intermediate CA: 7 ...
Bernard Haidamous's user avatar
14 votes
3 answers
2k views

The government of Kazakhstan, in order for citizens to use electronic government services (egov.kz), requires installing the NCALayer application on the computer for working with digital signatures. ...
sunvis0r's user avatar
  • 143
1 vote
1 answer
369 views

TL;DR: I want to forward-chain client certificates by including their successor public key as an extension. See Questions. I am thinking about using client-side certificates in TLS (mTLS) as a more ...
Karsten's user avatar
  • 11
3 votes
1 answer
1k views

I do not know much about how MS Windows interprets client certificates but I was faced with a statement I have a hard time integrating. The context: organization EXAMPLE has an Active Directory and an ...
WoJ's user avatar
  • 9,248
3 votes
1 answer
4k views

I’m in the process of developing a native app and am currently trying to come up with a workflow to secure the communication between my app and the server. I’ve done a lot of research and have not ...
Rhubarb's user avatar
  • 41
0 votes
1 answer
155 views

GPG allows file encryption for multiple recipients. I prefer to encrypt files: Only to recipient subkeys shared with me by the intended recipients, like so: $ gpg --encrypt --armor --recipient <...
Suhas Srivastava's user avatar
2 votes
0 answers
185 views

I`m working on a project for improving security of IoT devices by using per device X.509 certificate for authentication. The company uses IoT sensors, created inhouse, to gather data for analytics. ...
Zapo's user avatar
  • 21
5 votes
5 answers
3k views

About TLS Client Certificates How does a TLS client certificate prove the identity of the client? Yes, only the client has the private key so a client-key handshake can be completed. But how does that ...
WoodManEXP's user avatar
5 votes
2 answers
1k views

I understand that each certificate can have a CRL distribution point (extension 2.5.29.31) – or even multiple ones, but let's not consider that for the moment. Let's assume we have a root CA > ...
not2savvy's user avatar
  • 824
12 votes
3 answers
2k views

With all currently ongoing global conflicts in the world, I was thinking about removing default trusted certificate authorities root certificates that are from countries that are (no longer) ...
Bob Ortiz's user avatar
  • 7,733
2 votes
1 answer
291 views

Internet.nl checks a domain for some security settings among which: Route Origin Authorisation existence and Route announcement validity for both the webserver and nameserver IP addresses. They write: ...
Bob Ortiz's user avatar
  • 7,733

15 30 50 per page
1
2 3 4 5
92