<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:og="http://ogp.me/ns#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:sioc="http://rdfs.org/sioc/ns#" xmlns:sioct="http://rdfs.org/sioc/types#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" version="2.0" xml:base="https://www.linuxjournal.com/">
  <channel>
    <title>PKI</title>
    <link>https://www.linuxjournal.com/</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>Understanding Public Key Infrastructure and X.509 Certificates</title>
  <link>https://www.linuxjournal.com/content/understanding-public-key-infrastructure-and-x509-certificates</link>
  <description>  &lt;div data-history-node-id="1340425" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/jeff-woods" lang="" about="https://www.linuxjournal.com/users/jeff-woods" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Jeff Woods&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;&lt;em&gt;An introduction to PKI, TLS and X.509, from the ground up.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;
Public Key Infrastructure (PKI) provides a framework of encryption and data
communications standards used to secure communications over public networks.
At the heart of PKI is a trust built among clients, servers and certificate
authorities (CAs). This trust is established and propagated through the
generation, exchange and verification of certificates.
&lt;/p&gt;

&lt;p&gt;
This article focuses on understanding the certificates used to establish
trust between clients and servers. These certificates are the most visible
part of the PKI (especially when things break!), so understanding them will
help to make sense of—and correct—many common errors.
&lt;/p&gt;

&lt;p&gt;
As a brief introduction, imagine you want to connect to your bank to
schedule a bill payment, but you want to ensure that your communication is secure.
"Secure" in this context means not only that the content remains
confidential, but also that the server with which you're communicating actually
belongs to your bank.
&lt;/p&gt;

&lt;p&gt;
Without protecting your information in transit, someone located between you
and your bank could observe the credentials you use to log in to the server,
your account information, or perhaps the parties to which your payments are
being sent. Without being able to confirm the identity of the server, you
might be surprised to learn that you are talking to an impostor (who now has
access to your account information).
&lt;/p&gt;

&lt;p&gt;
Transport layer security (TLS) is a suite of protocols used to negotiate a
secured connection using PKI. TLS builds on the SSL standards of the late
1990s, and using it to secure client to server connections on the internet has
become ubiquitous. Unfortunately, it remains one of the least understood
technologies, with errors (often resulting from an incorrectly configured
website) becoming a regular part of daily life. Because those errors are
inconvenient, users regularly click through them without a second thought.
&lt;/p&gt;

&lt;p&gt;
Understanding the X.509 certificate, which is fully defined in RFC 5280, is
key to making sense of those errors. Unfortunately, these certificates have a
well deserved reputation of being opaque and difficult to manage. With the
multitude of formats used to encode them, this reputation is rightly deserved.
&lt;/p&gt;

&lt;p&gt;
An X.509 certificate is a structured, binary record. This record consists of
several key and value pairs. Keys represent field names, where values may be
simple types (numbers, strings) to more complex structures (lists). The
encoding from the key/value pairs to the structured binary record is done
using a standard known as ASN.1 (Abstract Syntax Notation, One), which is a
platform-agnostic encoding format.
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/understanding-public-key-infrastructure-and-x509-certificates" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Fri, 21 Jun 2019 12:30:00 +0000</pubDate>
    <dc:creator>Jeff Woods</dc:creator>
    <guid isPermaLink="false">1340425 at https://www.linuxjournal.com</guid>
    </item>

  </channel>
</rss>
