SlideShare a Scribd company logo
SSL for Apps – Brook R. Chelmo 1
Understanding SSL for Apps
Brook R. Chelmo
Principal Product Marketing Manager
Introduction
• SSL/TLS is a core technology; critical to secure communications
• The greatest challenge is not technology but implementation
• Researchers found widespread errors in non-browser apps
• Take the necessary steps to create a stronger & more
trustworthy SSL implementation
SSL for Apps – Brook R. Chelmo 2
Chain Building
• During the SSL handshake the server will return one or more
certificates
SSL for Apps – Brook R. Chelmo 3
Chain Building
• During the SSL handshake the server will return one or more
certificates.
• Misconfigured web servers may return more or fewer
certificates than what is necessary.
SSL for Apps – Brook R. Chelmo 4
Chain Building
• During the SSL handshake the server will return one or more
certificates.
• Misconfigured web servers may return more certificates than
what is necessary.
• You may find a pointer to the certificate’s issuing certificate in
the caIssuers entry in its authorityInfoAccess extension.
• NOTE: Ignore self-signed certificates.
SSL for Apps – Brook R. Chelmo 5
Build a Certificate Chain
• Determine the end-entity SSL certificate by building a certificate
chain.
• The AuthorityKeyIdentifier or Issuer Distinguished Name must
match the SubjectKeyIdentifier or Subject Distinguished Name.
SSL for Apps – Brook R. Chelmo 6
Root CA
Intermediate CA
End Entity Certs
SKI
AKI SKI
AKI
Chain of Trust
Chained
Hierarchy
Build a Certificate Chain
• Verify that the chain from end-entity to intermediate to root is
valid.
SSL for Apps – Brook R. Chelmo 7
3 Scenarios
Consider which certificates you will trust. Three Options:
1. Trust one certificate.
2. Allow any End-Entity SSL certificate signed by a particular trusted
intermediate. Pick only one trusted root and avoid trusting all end-entity
certificates that chain up to that root.
3. Require the end-entity to chain up to a certain trusted root and be signed
by an intermediate certificate with a specific common name.
SSL for Apps – Brook R. Chelmo 8
The 5 End-Entity & Intermediate Checks
1. Note that strings in certificates are stored as a byte length
followed by that number of bytes. Don’t assume they’re null-
terminated. There may also be different types of encoding
such as UTF-8.
2. Check the validity against an accurate time source.
3. Check for either a crlDistributionPoints or authorityInfoAccess
extension.
4. The app must be able to recognize & understand “critical”
extensions.
5. Check the certificatePolicies extension.
SSL for Apps – Brook R. Chelmo 9
The 4 Additional End-Entity Checks
1. Verify the FQDN or IP address appears in the Common Name
or the SAN extension (newer certificates).
1. Take into account proper wildcards
2. Reject the certificate if it has more than one common name.
3. IDN certificates should contain a punycode Unicode domain name in
the Common Name or SAN
2. If it has a basicConstraints extension, check that the cA flag is
set to “false” and the pathLenContraints is set to “zero”
3. If the certificate has a keyUsage extension, check that the
digitalSignature and keyEncipherments bits are set.
SSL for Apps – Brook R. Chelmo 10
The 4 Additional End-Entity Checks
4. If the certificate contains an extKeyUsage extension, the
extension value must be either the special
anyExtendedKeyUsage value, or if it contains special purpose
OIDs, then id-kp-serverAuth must be included.
SSL for Apps – Brook R. Chelmo 11
The 3 Additional Intermediate Checks
1. Must contain a basicConstraints extension with a cA flag of
“true.”
2. Must contain a keyUsage extension with a keyCertSign set.
3. Check that any name or policy constraints are consistent with
those in the certificates beneath it in the chain.
SSL for Apps – Brook R. Chelmo 12
Conclusion
SSL for Apps – Brook R. Chelmo 13
Proper SSL provides confidentiality, authentication,
and integrity without interception or modification.
Symantec is leading the way in security and authentication
practices by working with browser developers, customers,
bloggers, & other stakeholders to build a better security
ecosystem.
Thank you!
Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
SSL for Apps – Brook R. Chelmo 14
Symantec World Headquarters
350 Ellis Street
Mountain View, CA 94043 USA
1 (866) 893 6565
www.symantec.com

More Related Content

PPTX
Microsoft Exchange Server & SSL Certificates: Everything you need to know
PPTX
Shift to HTTPS and Save Your Website from the Wrath of Blacklisting
PPT
Adwebtech ssl presentation_beyond_https
PDF
Vps server 14
PPTX
JoomlaDay Austria 2016 - Presentation Why and how to use HTTPS on your website!
PPTX
How Secure is Azure?
PDF
bcs_sb_TechPartner_SSLVisibility_Venafi_EN_v1e
PPTX
Ssl certificate in internet world
Microsoft Exchange Server & SSL Certificates: Everything you need to know
Shift to HTTPS and Save Your Website from the Wrath of Blacklisting
Adwebtech ssl presentation_beyond_https
Vps server 14
JoomlaDay Austria 2016 - Presentation Why and how to use HTTPS on your website!
How Secure is Azure?
bcs_sb_TechPartner_SSLVisibility_Venafi_EN_v1e
Ssl certificate in internet world

What's hot (19)

PPTX
Symantec SSL Explained
PPTX
F5 Networks Adds To Oracle Database
PPTX
Windows Azure Security & Compliance
PDF
Recipe for good secrets management
PPTX
SSL f or WordPress Websites
PDF
Azlan Security Offering
PPTX
Ssl pinning and hsts header
PPTX
Zero trust Architecture
PPTX
Security in microservices architectures
PDF
F5 TLS & SSL Practices
PDF
Top 10 Web Application vulnerabilities
PPTX
State of the Web
PPTX
Let's get started with passwordless authentication using windows hello in you...
PPTX
Chapter1:information security overview
PDF
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...
PPTX
WSO2 Identity Server 5.3.0 - Product Release Webinar
PDF
Web Application Scanning 101
PPTX
Chapter4:Be The Attacker
Symantec SSL Explained
F5 Networks Adds To Oracle Database
Windows Azure Security & Compliance
Recipe for good secrets management
SSL f or WordPress Websites
Azlan Security Offering
Ssl pinning and hsts header
Zero trust Architecture
Security in microservices architectures
F5 TLS & SSL Practices
Top 10 Web Application vulnerabilities
State of the Web
Let's get started with passwordless authentication using windows hello in you...
Chapter1:information security overview
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...
WSO2 Identity Server 5.3.0 - Product Release Webinar
Web Application Scanning 101
Chapter4:Be The Attacker
Ad

Similar to Understanding SSL Certificate for Apps by Symantec (20)

PDF
SSL / TLS Validation | CASecurity.org | RapidSSLonline
PPTX
Certificate pinning v certificate transparency
PPTX
Certificate pinning in android applications
PPTX
Demystfying secure certs
PDF
Shmat ccs12
PDF
the-most-dangerous-code-in-the-world
PDF
the-most-dangerous-code-in-the-world
PPTX
Secure Socket Layer SSL Certificate.pptx
PPTX
Ssl in a nutshell
PDF
SSL: Past, Present and Future
PDF
SSL: Past, Present and Future
PDF
Q1) Show what part of SSL that protects against the following attack.pdf
PDF
HTTPS, Here and Now
PDF
Dr. Omar Ali Alibrahim - Ssl talk
PDF
Understanding The World Of SSL Certificates.pdf
PPTX
Creating Secure Web Apps: What Every Developer Needs to Know About HTTPS Today
PPTX
All access demystifying certs
PDF
OSCM 2024 | Ignite: Monitoring and maintaining self-signed certificates is da...
PPTX
Secure socket layer
 
SSL / TLS Validation | CASecurity.org | RapidSSLonline
Certificate pinning v certificate transparency
Certificate pinning in android applications
Demystfying secure certs
Shmat ccs12
the-most-dangerous-code-in-the-world
the-most-dangerous-code-in-the-world
Secure Socket Layer SSL Certificate.pptx
Ssl in a nutshell
SSL: Past, Present and Future
SSL: Past, Present and Future
Q1) Show what part of SSL that protects against the following attack.pdf
HTTPS, Here and Now
Dr. Omar Ali Alibrahim - Ssl talk
Understanding The World Of SSL Certificates.pdf
Creating Secure Web Apps: What Every Developer Needs to Know About HTTPS Today
All access demystifying certs
OSCM 2024 | Ignite: Monitoring and maintaining self-signed certificates is da...
Secure socket layer
 
Ad

More from CheapSSLsecurity (20)

PPTX
What is Asymmetric Encryption? Understand with Simple Examples
PPTX
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
PPTX
How to Fix ERR_SSL_VERSION_OR_CIPHER_MISMATCH Error
PPTX
Apache Server: Common SSL Errors and Troubleshooting Guide
PPTX
Multi Domain Wildcard Features explained by CheapSSLsecurity
PPTX
Various Types of OpenSSL Commands and Keytool
PPTX
What is Certificate Transparency (CT)? How does it work?
PDF
Norton Cyber Security Insights Report 2017
PPTX
The Top Five Cybersecurity Threats for 2018
PPTX
Is your business PCI DSS compliant? You’re digging your own grave if not
PPTX
Phishing Scams: 8 Helpful Tips to Keep You Safe
PPTX
How Hashing Algorithms Work
PPTX
Quantum Computing vs Encryption: A Battle to Watch Out for
PDF
Symantec (ISTR) Internet Security Threat Report Volume 22
PPTX
Hashing vs Encryption vs Encoding
PPTX
Thawte Wildcard SSL Certificates – Enable Sub-Domains Security
PDF
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
PPTX
Why Green Address Bar EV SSL Certificates are Critical to E-commerce
PPTX
4 Major Reasons for Big Organizations to Have Wildcard SSL Certificates
PDF
Comodo: The Benefits of EV SSL Certificates - CheapSSLsecurity
What is Asymmetric Encryption? Understand with Simple Examples
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
How to Fix ERR_SSL_VERSION_OR_CIPHER_MISMATCH Error
Apache Server: Common SSL Errors and Troubleshooting Guide
Multi Domain Wildcard Features explained by CheapSSLsecurity
Various Types of OpenSSL Commands and Keytool
What is Certificate Transparency (CT)? How does it work?
Norton Cyber Security Insights Report 2017
The Top Five Cybersecurity Threats for 2018
Is your business PCI DSS compliant? You’re digging your own grave if not
Phishing Scams: 8 Helpful Tips to Keep You Safe
How Hashing Algorithms Work
Quantum Computing vs Encryption: A Battle to Watch Out for
Symantec (ISTR) Internet Security Threat Report Volume 22
Hashing vs Encryption vs Encoding
Thawte Wildcard SSL Certificates – Enable Sub-Domains Security
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
Why Green Address Bar EV SSL Certificates are Critical to E-commerce
4 Major Reasons for Big Organizations to Have Wildcard SSL Certificates
Comodo: The Benefits of EV SSL Certificates - CheapSSLsecurity

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
KodekX | Application Modernization Development
PDF
Approach and Philosophy of On baking technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PPT
Teaching material agriculture food technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Spectral efficient network and resource selection model in 5G networks
Mobile App Security Testing_ A Comprehensive Guide.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Machine learning based COVID-19 study performance prediction
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation theory and applications.pdf
Understanding_Digital_Forensics_Presentation.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
NewMind AI Weekly Chronicles - August'25 Week I
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Building Integrated photovoltaic BIPV_UPV.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
KodekX | Application Modernization Development
Approach and Philosophy of On baking technology
Encapsulation_ Review paper, used for researhc scholars
Teaching material agriculture food technology
Digital-Transformation-Roadmap-for-Companies.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11

Understanding SSL Certificate for Apps by Symantec

  • 1. SSL for Apps – Brook R. Chelmo 1 Understanding SSL for Apps Brook R. Chelmo Principal Product Marketing Manager
  • 2. Introduction • SSL/TLS is a core technology; critical to secure communications • The greatest challenge is not technology but implementation • Researchers found widespread errors in non-browser apps • Take the necessary steps to create a stronger & more trustworthy SSL implementation SSL for Apps – Brook R. Chelmo 2
  • 3. Chain Building • During the SSL handshake the server will return one or more certificates SSL for Apps – Brook R. Chelmo 3
  • 4. Chain Building • During the SSL handshake the server will return one or more certificates. • Misconfigured web servers may return more or fewer certificates than what is necessary. SSL for Apps – Brook R. Chelmo 4
  • 5. Chain Building • During the SSL handshake the server will return one or more certificates. • Misconfigured web servers may return more certificates than what is necessary. • You may find a pointer to the certificate’s issuing certificate in the caIssuers entry in its authorityInfoAccess extension. • NOTE: Ignore self-signed certificates. SSL for Apps – Brook R. Chelmo 5
  • 6. Build a Certificate Chain • Determine the end-entity SSL certificate by building a certificate chain. • The AuthorityKeyIdentifier or Issuer Distinguished Name must match the SubjectKeyIdentifier or Subject Distinguished Name. SSL for Apps – Brook R. Chelmo 6 Root CA Intermediate CA End Entity Certs SKI AKI SKI AKI Chain of Trust Chained Hierarchy
  • 7. Build a Certificate Chain • Verify that the chain from end-entity to intermediate to root is valid. SSL for Apps – Brook R. Chelmo 7
  • 8. 3 Scenarios Consider which certificates you will trust. Three Options: 1. Trust one certificate. 2. Allow any End-Entity SSL certificate signed by a particular trusted intermediate. Pick only one trusted root and avoid trusting all end-entity certificates that chain up to that root. 3. Require the end-entity to chain up to a certain trusted root and be signed by an intermediate certificate with a specific common name. SSL for Apps – Brook R. Chelmo 8
  • 9. The 5 End-Entity & Intermediate Checks 1. Note that strings in certificates are stored as a byte length followed by that number of bytes. Don’t assume they’re null- terminated. There may also be different types of encoding such as UTF-8. 2. Check the validity against an accurate time source. 3. Check for either a crlDistributionPoints or authorityInfoAccess extension. 4. The app must be able to recognize & understand “critical” extensions. 5. Check the certificatePolicies extension. SSL for Apps – Brook R. Chelmo 9
  • 10. The 4 Additional End-Entity Checks 1. Verify the FQDN or IP address appears in the Common Name or the SAN extension (newer certificates). 1. Take into account proper wildcards 2. Reject the certificate if it has more than one common name. 3. IDN certificates should contain a punycode Unicode domain name in the Common Name or SAN 2. If it has a basicConstraints extension, check that the cA flag is set to “false” and the pathLenContraints is set to “zero” 3. If the certificate has a keyUsage extension, check that the digitalSignature and keyEncipherments bits are set. SSL for Apps – Brook R. Chelmo 10
  • 11. The 4 Additional End-Entity Checks 4. If the certificate contains an extKeyUsage extension, the extension value must be either the special anyExtendedKeyUsage value, or if it contains special purpose OIDs, then id-kp-serverAuth must be included. SSL for Apps – Brook R. Chelmo 11
  • 12. The 3 Additional Intermediate Checks 1. Must contain a basicConstraints extension with a cA flag of “true.” 2. Must contain a keyUsage extension with a keyCertSign set. 3. Check that any name or policy constraints are consistent with those in the certificates beneath it in the chain. SSL for Apps – Brook R. Chelmo 12
  • 13. Conclusion SSL for Apps – Brook R. Chelmo 13 Proper SSL provides confidentiality, authentication, and integrity without interception or modification. Symantec is leading the way in security and authentication practices by working with browser developers, customers, bloggers, & other stakeholders to build a better security ecosystem.
  • 14. Thank you! Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. SSL for Apps – Brook R. Chelmo 14 Symantec World Headquarters 350 Ellis Street Mountain View, CA 94043 USA 1 (866) 893 6565 www.symantec.com