Blog Archives

SSL Exploration and Analysis

During the recent investigation of certificates and SSL, a co-worker (Ola) forwarded a web link about an organization that is analyzing web SSL certificates.  The information was very relevant and interesting. The EFF SSL Observatory Quote from site: The EFF

Tagged with: , ,
Posted in Certificates, SSL

Public Key Certificate Locations in Windows

Since last week I have been looking more at depth with how certificates work.  One thing that was bugging me was not knowing where the information is stored.  There are plenty of references to the certificates being stored in files

Tagged with: ,
Posted in Certificates, Windows

Certificate Public Key Usage

Public keys that reside inside certificates are only meant to be used for certain things.  This is indicated by the Key Usage and Extended Key Usage extensions. The first stop is documentation from OpenSSL. Key usage supported names: digitalSignature nonRepudiation

Tagged with: , ,
Posted in Certificates, PKI

Digital Certificates (part 2 of 2)

Part two continues on the topic of digital certificates.    One of the keys is private and the other is public. Below are some useful examples and explanations from Novell: But, how does this work on the Internet for transactions?

Tagged with: ,
Posted in Certificates, PKI

Digital Certificates (part 1 of 2)

This post will explore digital certificates.  Consider this as a result of a need to learn more detail about how certificates work. Start here: VeriSign: Introduction to Digital Certificates VeriSign: Introduction to Public Key Cryptography Paraphrasing: Cryptography solves many key

Tagged with: , ,
Posted in Certificates, Security, SSL
Follow Red Circle Blog on