Security/Features/CA pinning functionality: Difference between revisions

Jump to navigation Jump to search
no edit summary
No edit summary
No edit summary
Line 10: Line 10:
}}
}}
{{FeaturePageBody
{{FeaturePageBody
|Feature overview=As they can require HTTPS connections (via HSTS), sites may want to also restrict the CAs who can issue certificates for their domain to one or a few that they trust.  This can be accomplished via a list of certificate fingerprints that are exclusively allowed to act as trust anchors for a given domain.  This is like what chrome has done [http://www.imperialviolet.org/2011/05/04/pinning.html].
|Feature overview=As they can require HTTPS connections (via HSTS), sites may want to also restrict the CAs who can issue certificates for their domain to one or a few that they trust.  This can be accomplished via a list of certificate fingerprints that are exclusively allowed to act as trust anchors for a given domain.  This is like what chrome has done [http://www.imperialviolet.org/2011/05/04/pinning.html] except we would not be managing a static list of anchors.
|Feature users and use cases=CA x is compromised and grants a certificate for example.com to an attacker.  The owners of example.com have their site pinned to the certificate for CA y, so when the attacker attempts to use the certificate from x, he fails to satisfy the pinning requirement and thus any users presented with his certificate will not have access to the fraudulent connection.
|Feature users and use cases=CA x is compromised and grants a certificate for example.com to an attacker.  The owners of example.com have their site pinned to the certificate for CA y, so when the attacker attempts to use the certificate from x, he fails to satisfy the pinning requirement and thus any users presented with his certificate will not have access to the fraudulent connection.
|Feature requirements=See https://tools.ietf.org/html/draft-evans-palmer-hsts-pinning
|Feature non-goals=* This is not a replacement for the existing x.509 PKI infrastructure.  It is a refinement.
|Feature non-goals=* This is not a replacement for the existing x.509 PKI infrastructure.  It is a refinement.
}}
}}
Confirmed users
717

edits

Navigation menu