What's in a Digital Certificate?

Поділитися
Вставка

КОМЕНТАРІ • 47

  • @hysteria648
    @hysteria648 Місяць тому +1

    7 years later and still slaps

  • @netsnower
    @netsnower 6 років тому +2

    GREAT video explaining digital certificates, thanks!!!

    • @devcentral
      @devcentral  6 років тому

      we are glad you found it helpful!

  • @romeotango2676
    @romeotango2676 6 років тому +1

    Great video. Thanks for valuable information.

  • @user-ot7er9ts7q
    @user-ot7er9ts7q 5 років тому +4

    Love your lessons.Thanks!

  • @SwarnadeepNandy
    @SwarnadeepNandy 5 років тому +3

    Really awesome informative video. No bulshiting around, direct to the point information. Too good. I would request you to make a video on mutual authentication.

    • @devcentral
      @devcentral  5 років тому

      glad you enjoyed it!

    • @adarshrao1692
      @adarshrao1692 5 років тому

      @@devcentral yes, mutual authentication

  • @darshanpurohit2757
    @darshanpurohit2757 5 років тому +2

    @John perfact explanations in all tutorials!!! Learning from u thanks

  • @Dvach_Hikka
    @Dvach_Hikka 6 років тому +1

    Love your lessons.

    • @devcentral
      @devcentral  6 років тому

      glad you are finding them helpful!

  • @AmolGautam
    @AmolGautam 3 роки тому +3

    Very helpful for interview preparation.

    • @devcentral
      @devcentral  3 роки тому

      I'm glad it was helpful...and I hope you did well in the interview!

  • @manojgudimalla
    @manojgudimalla 5 років тому +1

    Thanks for valuable information.

  • @oklasibai
    @oklasibai 5 років тому +1

    it really helps me to understand better thanks!

  • @dhanushm419
    @dhanushm419 6 років тому +1

    great video!!

  • @sunilkataria7439
    @sunilkataria7439 6 років тому +1

    My workstation is in a private network and does not have any Internet access. I then allow this workstation to access one https site (only one https site). Will it work, because my workstation can’t access URL given in the AIA (Authority Information Access) of digital certificate?

  • @gamerluke7
    @gamerluke7 4 роки тому +2

    Thanks for the informative video, John. Though I am just wondering, what is benefit of generating the hash and then running the signature algorithm with that hash, rather than the entire contents of the certificate? Thanks

    • @devcentral
      @devcentral  4 роки тому +6

      Hi Luke...great question! The reason for signing the hash is because of the resources it would take to sign the full contents of the certificate. It's much faster to hash it and then sign the hash. So, it speeds things up significantly to do it this way. You know how users are...they want stuff fast! No one wants to sit there and watch their favorite web page spin for a few minutes while the security mechanisms are at work in the background. Thanks again for the great question!!

    • @zenchiassassin283
      @zenchiassassin283 4 роки тому +1

      @@devcentral do you have a video on Station to Station protocol?

    • @devcentral
      @devcentral  4 роки тому +1

      @@zenchiassassin283 not at this point, but we can look at recording one. thanks!

  • @Rajuvadarevu
    @Rajuvadarevu 4 роки тому +1

    AIA is also https hosted, so it will have its own Digital Certificate which will contain another AIA, and that will contain another Certificate. So when this chain will stop ?

    • @scottbiggs9846
      @scottbiggs9846 3 роки тому

      Yes, time has stopped while waiting for this question to be answered!

  • @rahulreddy7513
    @rahulreddy7513 4 роки тому

    Certificate also has the actual signature of CA using CA private key after hashing the entire content you mentioned . Isn’t it ?

    • @devcentral
      @devcentral  4 роки тому

      Great question! Yes, the CA will typically sign the certificate using their private key so that the users will know that the cert is from the legitimate CA that it claims to be from.

  • @adarshrao1692
    @adarshrao1692 5 років тому +1

    thanks man. Quick question.. When we say certificate authentication, what are the things which are checked before authenticating ?

    • @devcentral
      @devcentral  5 років тому +1

      Hi Adarsh, great question! Typically, a client (browser) will check the server's certificate for expiration date, signature from valid CA, and valid cert chain before it will connect to the web server. If any of these things are not an expected value, then it will show a warning page to the user (cert invalid, cert expired, etc) and make the user accept the security risk before proceeding to the site.

    • @adarshrao1692
      @adarshrao1692 5 років тому

      @@devcentral thanks.. My question was more with respectto Mutual auth. In mutual auth what parameters are generally checked to perform a succesful authentication connection

  • @scottbiggs9846
    @scottbiggs9846 3 роки тому +1

    How does the client know that the AIA is legitimate? It's the first thing I'd to when luring people onto my website--send them to one of my other websites for verification! Similar for the CRL.

    • @devcentral
      @devcentral  3 роки тому +1

      Thanks for the great question/observation! The legitimacy of the AIA (and the other pieces of the certificate) really relies on the authenticity of the contents of the certificate being genuine. And this relies on the authenticity of the Certificate Authority creating a valid certificate that has all the correct (accurate) information in it. This is why it's important that the Certificate Authority (CA) sign the certificate and prove that all of its contents are genuine and correct. And, it's also important that the client (browser) interacts with certificates properly. So, in your example, if an attacker wanted to modify the URL of the certificate revocation location, then the attacker would need to figure out a way to modify that portion of the certificate without changing the hash value of the certificate from the CA. And, this relies on the strength of the hashing algorithm used to create the hash and sign the certificate. It's all a series of trust in processes/algorithms that we collectively believe to be reliable and trustworthy. Thanks again...and great observations!

  • @MrMShake
    @MrMShake 3 роки тому +1

    does the certificate include the domain or even IP address of the server? if not how does the client verify identity if the certificate does not state it?

    • @devcentral
      @devcentral  3 роки тому

      Great question! Yes, the certificate includes the domain name (or sometimes multiple domain names) of the server, so the client can match the identity.

    • @goodev
      @goodev 2 роки тому

      @@devcentral Yes, the domain information was missed on the whiteboard, and it was an important piece, imo. Also, it is not clear about the hash signature. What is used to create the hash and how exactly the hash is used? Is the hash signed? If the browser is verifying the certificate, would they need to generate the hash from the body of the certificate, use the public key to encrypt it and then compare it against the signed hash value in the certificate? Or is the hash use in any other way? Also, what is a certificate thumbprint?

  • @vivekchavan3170
    @vivekchavan3170 4 роки тому

    Is this video mute?

    • @devcentral
      @devcentral  4 роки тому

      Just checked it out and sound is working fine.

  • @juanjoseaguero6539
    @juanjoseaguero6539 5 років тому

    full theory....it would be better if you show some practical ...the protocol in real life action!

    • @anirudhreddybasani3555
      @anirudhreddybasani3555 5 років тому +2

      just click on the lock symbol which on the left side of the search bar. Then click on certificate, go to details..there you will see all the details of the certificate practically for this youtube page.

  • @uncensoredx6291
    @uncensoredx6291 7 років тому +7

    How the hell u are writing...man
    are u writing backwards on mirror

    • @MikeDeanOfficials
      @MikeDeanOfficials 7 років тому

      Uncensored x they have done a video on it. Check dev central

    • @krs357
      @krs357 6 років тому

      Dude's a wizard!

  • @sunilkataria7439
    @sunilkataria7439 6 років тому

    My workstation is in a private network and does not have any Internet access. I then allow this workstation to access one https site (only one https site). Will it work, because my workstation can’t access URL given in the AIA (Access Information Access) of digital certificate?