Monthly Archives: May 2016

How to perform a revocation of SSL-certificate?

SSL-Certificate Revocation procedure. When is it required? Revocation of the certificate is often used by companies, when they want to replaced it. However, this decision is not correct. Revocation of SSL-certificate makes it unusable. Any web site or a server that

Posted in Reissuance Tagged with: , , ,

How to choose a reliable certification authority?

Small websites that need an average DV-certificate, can request it at any of the certificate authorities. Their task as simple as buying the cheapest certificate that is available. Any public certification authority is issuing these kind of certificates. Why pay more? However, if you need a

Posted in CA Tagged with: , , , , ,

Key management best practices for SSL

Key Management is the one of the major issues that affect the security. The most successful attacks are related to encryption bypass rather than breaking through it. If an individual can get into your server and steal the private key,

Posted in What is an SSL-Certificate Tagged with: , , , ,

6 vulnerabilities in OpenSSL have been fixed

OpenSSL cryptographic library has released an update which will fix the six discovered issues. Only two of them are labeled as “critical”. OpenSSL is an important part of the Internet infrastructure, because it is one of the most widely used

Posted in Vulnerabilities Tagged with: , , , ,

Security Indicators, which provide SSL-certificates

Security indicators are the important elements of the user interface that allow you to verify that the page is secure. Indicators will notify users of the following: page uses SSL encryption; Website owned by a legal company; page uses an invalid certificate; page

Posted in What is an SSL-Certificate Tagged with: , , , ,

Why is there a huge number of invalid certificates?

The spread of invalid certificates is wide enough. It is difficult to find anyone who has never encountered them. Here are some reasons that lead to such a wide spread of invalid certificates: Incorrectly configured virtual hosting Most sites now

Posted in Vulnerabilities Tagged with: , , , ,

Sidejacking and how to beat it with SSL

Sidejacking – a special kind of theft, where an attacker intercepts traffic of user sessions, ie, for example, the traffic between the Wi-Fi router and user connect to the internet. We can find the plug-in Firefox, which automates session hijacking

Posted in Vulnerabilities Tagged with: , , , , ,

Which extensions can have a certificate?

Certificate extensions were introduced in version 3. They will add flexibility to the past quite a limited format of the certificate. Each extension includes a unique object identifier (OID), criticality identifier, and value, which is the structure of ASN.1. An

Posted in What is an SSL-Certificate Tagged with: , , , ,

Which fields includes the certificate?

Certificate consists of fields and a set of extensions (version 3). Structure of fields is linear, though some fields may contain other structure. Version. There are three versions of certificates: 1, 2 and 3, numbered as 0, 1 and 2.

Posted in What is an SSL-Certificate Tagged with: , , , ,

All about SSL

This site is dedicated to SSL-certificates. You will learn what is an SSL certificate, how to issue and reissue it. FAQ SSL will be useful for both novices and pros. SSL Knowledgebase contains sections on validation, trust logo, vulnerabilities, SSL-certificates differences by type (Wildcard, EV, DV, etc.), as well as many other things.