HP Jetdirect 610n HP Jetdirect Print Servers - HP Jetdirect and SSL/TLS - Page 19

Self-Signed Certificate

Page 19 highlights

Jack Create Key Pair Jack's Public Key Jack's Private Key Jack Identity Info + Jack's Public Key Identity Info + Jack's Private Key (Stays Private) Identity Info + Jack's Public Key Preliminary Certificate One-Way Function/Hash Function Jack's Public Key Digital Signature Jack's self-signed Certificate Encryption Figure 21 - Self-Signed Certificate Basically, Jack's private key does the signing on his public key certificate. A root (top of the chain) certificate authority is going to go through the same process. So why is it okay for a Root CA to have a self-signed certificate but no one else to have one? Well, it is all about trust. There is no "higher" level of trust then the top level certificate authority. Therefore, in our previous examples, John and Jack must choose a particular certificate authority that they both trust. In most cases, there is a hierarchy of certificate authorities at customer sites. This forms what is known as a certificate chain and there is a top level CA or Root CA where the ultimate trust resides. Also, we should take care to point out that there is usually a difference between Internet trust using certificates and Intranet trust using certificates. Internet trust will involve well-known certificate authorities like Verisign and Entrust. However, Intranet models usually revolve around Microsoft's certificate authority that comes with Windows 2003 server. Each company establishes their own Public Key Infrastructure (PKI) that includes an entire policy around certificates. There is one other important thing to cover about certificates. Each certificate has a one or more "certificate purposes" that the certificate can be used for. For example, a Jetdirect self-signed certificate will have two purposes: client authentication and server authentication. A root certificate 19

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95

19
Jack
Jack’s Public Key
Jack’s Private Key
Identity Info +
Jack’s Public Key
Jack
Jack’s Private Key
(Stays Private)
Jack’s Public Key
Jack’s self-signed
Certificate
Jack’s Public Key
Create
Key Pair
One-Way Function/Hash Function
Identity Info +
Encryption
Identity Info +
Digital Signature
Preliminary Certificate
Figure 21 - Self-Signed Certificate
Basically, Jack’s private key does the signing on his public key certificate.
A root (top of the chain)
certificate authority is going to go through the same process.
So why is it okay for a Root CA to have
a self-signed certificate but no one else to have one?
Well, it is all about trust.
There is no “higher”
level of trust then the top level certificate authority.
Therefore, in our previous examples, John and
Jack must choose a particular certificate authority that they both trust.
In most cases, there is a
hierarchy of certificate authorities at customer sites.
This forms what is known as a certificate chain
and there is a top level CA or Root CA where the ultimate trust resides.
Also, we should take care to point out that there is usually a difference between Internet trust using
certificates and Intranet trust using certificates.
Internet trust will involve well-known certificate
authorities like Verisign and Entrust.
However, Intranet models usually revolve around Microsoft’s
certificate authority that comes with Windows 2003 server.
Each company establishes their own
Public Key Infrastructure (PKI) that includes an entire policy around certificates.
There is one other important thing to cover about certificates.
Each certificate has a one or more
“certificate purposes” that the certificate can be used for.
For example, a Jetdirect self-signed
certificate will have two purposes: client authentication and server authentication.
A root certificate