Global Information Lookup Global Information

Offline root certificate authority information


An offline root certificate authority is a certificate authority (as defined in the X.509 standard and RFC 5280) which has been isolated from network access, and is often kept in a powered-down state.

In a public key infrastructure, the chain of trusted authorities begins with the root certificate authority (root CA). Once the root CA is installed and its root certificate is created, the next action taken by the administrator of the root CA is to issue certificates authorizing intermediate (or subordinate) CAs. This creates the ability to issue, distribute and revoke digital certificates without the direct action of the root CA.

Because the consequences of a compromised root CA are so great (up to and including the need to re-issue each and every certificate in the PKI), all root CAs must be kept safe from unauthorized access. A common method to ensure the security and integrity of a root CA is to keep it in an offline state. It is only brought online when needed for specific, infrequent tasks, typically limited to the issuance or re-issuance of certificates authorizing intermediate CAs.

A drawback to offline operation is that hosting of a certificate revocation list by the root CA is not possible (as it is unable to respond to CRL requests via protocols such as HTTP, LDAP or OCSP). However, it is possible to move certificate validation functionality into a dedicated validation authority authorized by the offline root CA.

To better understand how an offline root CA can greatly improve the security and integrity of a PKI, it is important to realize that a CRL is specific to the CA which issued the certificates on the list. Therefore, each CA (root or intermediate) is only responsible for tracking the revocation of certificates it alone has issued.

Consider the scenario where a root CA issues certificates to three intermediate CAs: A, B, and C:

  • The root CA has issued a total of three certificates.

The newly created intermediate CAs then issue their own certificates:

  • Intermediate CA "A" issues 10,000 certificates
  • Intermediate CA "B" issues 20,000 certificates
  • Intermediate CA "C" issues 30,000 certificates

If each intermediate CA were to revoke all certificates issue by it, the maximum size of the CRL specific to each Intermediate CA would be:

  • Intermediate CA "A": 10,000 CRL entries
  • Intermediate CA "B": 20,000 CRL entries
  • Intermediate CA "C": 30,000 CRL entries

However, because the root CA has only issued three certificates (to each of the intermediate CAs), the maximum size of its CRL is:

  • Root CA: 3 CRL entries

Therefore, the overall burden of maintaining and hosting a CRL specific to the root CA is minimized by the use of intermediate CAs, as well as the burden of maintaining an associated validation authority.

and 25 Related for: Offline root certificate authority information

Request time (Page generated in 0.8555 seconds.)

Offline root certificate authority

Last Update:

An offline root certificate authority is a certificate authority (as defined in the X.509 standard and RFC 5280) which has been isolated from network...

Word Count : 487

Certificate authority

Last Update:

a certificate authority or certification authority (CA) is an entity that stores, signs, and issues digital certificates. A digital certificate certifies...

Word Count : 5156

Validation authority

Last Update:

dedicated validation authority allows for dynamic validation of certificates issued by an offline root certificate authority. While the root CA itself will...

Word Count : 218

Public key infrastructure

Last Update:

Symantec issued certificates, starting in 2017 and completed in 2021. This approach involves a server that acts as an offline certificate authority within a...

Word Count : 4068

Hardware security module

Last Update:

environment is generally less important, in both online and offline operations, as Registration Authority procedures represent the performance bottleneck of the...

Word Count : 2046

Transport Layer Security

Last Update:

digital certificate. The certificate contains the server name, the trusted certificate authority (CA) that vouches for the authenticity of the certificate, and...

Word Count : 17090

Domain Name System Security Extensions

Last Update:

holders to assert certificates for themselves, without reference to third-party certificate authorities. Support for DNSSEC stapled certificates was enabled...

Word Count : 7669

Windows 2000

Last Update:

MS-CHAP v2 protocol Public Key Infrastructure (PKI) and Enterprise Certificate Authority support Terminal Services and support for the Remote Desktop Protocol...

Word Count : 11662

Email client

Last Update:

managing cryptographic keys. S/MIME employs a model based on a trusted certificate authority (CA) that signs users' public keys. OpenPGP employs a somewhat more...

Word Count : 2651

National Register of Citizens for Assam

Last Update:

was facilitated to the public in both online and offline modes. Offline: People opting for the offline mode had to visit their nearest NSK for filling...

Word Count : 6990

Trustico

Last Update:

requirements for certificate authorities. This was followed by the disclosure of a critical security flaw – a publicly accessible root shell – in the Trustico...

Word Count : 554

Heartbleed

Last Update:

servers compromised due to the bug and also temporarily took its services offline. Platform maintainers like the Wikimedia Foundation advised their users...

Word Count : 9736

Internet in Kazakhstan

Last Update:

an attack would involve requiring all Internet users to install a root certificate controlled by the Kazakh government into all their devices, allowing...

Word Count : 3812

Windows Server 2012

Last Update:

becomes corrupt, the file can be deleted without taking the whole volume offline. As a result of built-in resiliency, administrators do not need to periodically...

Word Count : 5055

User profile

Last Update:

impressions about someone that is predictive or similarly meeting them offline. The condensed format of social media profiles allows for quick filtering...

Word Count : 2968

Features new to Windows XP

Last Update:

approval or until issued by the certificate authority and once approved, they install automatically. Root CA certificates now also auto-update via Microsoft...

Word Count : 20813

Vogtle Electric Generating Plant

Last Update:

components, as well as remove the decay heat from the reactor when the plant is offline. One natural-draft tower and two NSCW towers serve each unit. In 2009,...

Word Count : 5172

List of national identity card policies by country

Last Update:

card at least inside the country, and which is issued by an official authority. Driver's licenses and other cards issued by state or regional governments...

Word Count : 3719

Linux distribution

Last Update:

anonymity – for example, targeted by Tails, Whonix, Qubes, and FreedomBox Offline use – for example, Endless OS Gaming – for example, SteamOS The Free Standards...

Word Count : 5423

GNU IceCat

Last Update:

version 3.0.2-g1, the certificate of a certificate authority CAcert.org has been added to the list of trusted root certificates. Concern about that decision...

Word Count : 1163

Sustainable Development Goals

Last Update:

Sustainable Development Goals Wikipedia's health care articles can be viewed offline with the Medical Wikipedia app. UN Sustainable Development Knowledge Platform...

Word Count : 14644

List of file systems

Last Update:

between nodes (between servers or servers/clients) for high availability and offline (disconnected) operation. Coda from Carnegie Mellon University focuses...

Word Count : 4482

Energy law

Last Update:

energy, both renewable and non-renewable. These laws are the primary authorities (such as caselaw, statutes, rules, regulations and edicts) related to...

Word Count : 5960

Amazon Kindle

Last Update:

Chinese consumers and they can continue to purchase the Kindle through offline and third-party online retailers. In June 2022, Amazon announced that it...

Word Count : 15436

Computer security

Last Update:

spoofs the SSL authentication and encryption protocol by way of Certificate Authority injection in order to decrypt, surveil and modify traffic. See also...

Word Count : 22141

PDF Search Engine © AllGlobal.net