PKI Bootcamp - What is a PKI?

แชร์
ฝัง
  • เผยแพร่เมื่อ 17 มิ.ย. 2024
  • A PKI (public key infrastructure) is often confused with a CA (certificate authority) but it is much more than that. A PKI includes all of the components required to enable the use of certificates. Because of this, it represents the attack surface an attacker can exploit when attempting to leverage certificates and keys in their attacks.

ความคิดเห็น • 172

  • @eduardrotty8584
    @eduardrotty8584 3 ปีที่แล้ว +23

    you explained the PKI smoothly and using words that can reach casual, beginner and expert
    greetings from indonesia

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 ปีที่แล้ว +4

      I really appreciate the feedback, Raki. Greetings to you in Indonesia! I never imagined that my videos would reach so far around the world. It was a heartwarming greeting from you.

  • @rodrigomunoz1556
    @rodrigomunoz1556 3 ปีที่แล้ว +20

    Paul, you really have the talent to explain complex topics in an easy way, and your slides are awesome.

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 ปีที่แล้ว

      Thank you for your kind words, Erick. I’m very glad you liked the presentation and appreciate you taking the time to comment.

  • @IPv6people
    @IPv6people 3 ปีที่แล้ว +12

    Very clear and very agreeable to watch and listen to in all respects. I look forward to more of these ten-minute jewels.

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 ปีที่แล้ว +1

      Glad you liked it, Joost. I’m hoping to get another video done in a few weeks.

  • @lerneninverschiedenenforme7513
    @lerneninverschiedenenforme7513 3 ปีที่แล้ว +3

    This - is - awesome! The creme de la creme of explanations here! Thank you very much for the work!

  • @ranjankalita1220
    @ranjankalita1220 3 ปีที่แล้ว +1

    I have been reading about these concepts for a few days now, your video really helped me connect the dots. Thanks a lot. Beautifully explained.

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 ปีที่แล้ว +1

      You put a big smile on my face, Ranjan. Thanks for your comment.

  • @Sccoropio
    @Sccoropio 4 ปีที่แล้ว +9

    One of the best PKI explanations on TH-cam. A true reflection of the real world scenario.

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 ปีที่แล้ว +1

      I’m glad you liked it. Thanks for the feedback.

  • @BattyVibess
    @BattyVibess 5 หลายเดือนก่อน +1

    After an hour of reading about PKI, trying to understand it and failing, I finally have a grasp on this now. Thank you, Paul!

  • @Yazeenj1
    @Yazeenj1 5 ปีที่แล้ว +28

    Easy to understand and a really great explanation Paul, i can't thank you enough for this

    • @PaulTurnerChannel
      @PaulTurnerChannel  5 ปีที่แล้ว

      SkillexeD, I'm really glad you like it. That means a lot to me. Thanks.

    • @zes7215
      @zes7215 3 ปีที่แล้ว

      wrg

  • @markduong92
    @markduong92 3 ปีที่แล้ว +1

    This is probably one of the best explanations of Public Key Infrastructure. Great Job. I'll be sure to share this video.

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 ปีที่แล้ว

      I’m very glad you liked it, Mark. Thanks for the positive feedback!

  • @yanlevyexperience
    @yanlevyexperience 4 ปีที่แล้ว +2

    Great video on PKI Sir Paul, concise and informative. The best I have seen so far.

  • @salakhre3775
    @salakhre3775 5 ปีที่แล้ว +4

    The best, easiest and detailed explanation for beginners to the expert.
    Thank you for making such great video.

    • @PaulTurnerChannel
      @PaulTurnerChannel  5 ปีที่แล้ว +1

      Thanks for the kind comment, Salakh. I really appreciate it.

  • @the-sunny-side-up
    @the-sunny-side-up 7 ปีที่แล้ว

    These presentations are very very helpful, Paul. I was looking for an easy explanation of PKI certificate issuance and verification and your presentations were jackpot for me.

    • @PaulTurnerChannel
      @PaulTurnerChannel  7 ปีที่แล้ว

      I'm very glad to hear that, Arkadeep. Thank you for the feedback.

  • @jpbaloga
    @jpbaloga 3 ปีที่แล้ว +4

    This is a well-explained video about PKI since I'm on a journey for my CISSP cert. Thanks, Paul!

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 ปีที่แล้ว

      Good luck on your CISSP, John. I’m glad you found it helpful. Thanks for the feedback.

  • @aletheagallacher4265
    @aletheagallacher4265 3 ปีที่แล้ว +1

    Excellent presentation and clarity. Thank you!

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 ปีที่แล้ว

      Thank you very much for the positive feedback, Alethea. I really appreciate it!

  • @afnaanladji947
    @afnaanladji947 4 ปีที่แล้ว +1

    Hey Paul,
    your video makes a lot of sense.
    Well framed and explained.
    Thanks.

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 ปีที่แล้ว +1

      Thank you for the feedback, Afnaan. I’m glad it makes sense.

  • @catch.2022
    @catch.2022 3 ปีที่แล้ว +1

    This is a great video. It clarified so much for me. Thanks Paul!

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 ปีที่แล้ว

      I’m so glad to hear that, Ajay. I appreciate you taking the time to comment.

  • @hawaiiansoulrebel
    @hawaiiansoulrebel 3 ปีที่แล้ว +1

    Thank you for this explanation! Lots of other videos seem to rush through this topic.

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 ปีที่แล้ว +1

      Well, I guess if we’re going to have a Hawaiian soul (reference to your great screen name), we definitely don’t want to rush it ;-). Thanks a bunch for the kind feedback.

  • @samnnamani
    @samnnamani ปีที่แล้ว

    I just want to hug you and say thank you. Awesome. Bravo

  • @hicksticks2001
    @hicksticks2001 2 ปีที่แล้ว +1

    Was doing some research on post-quantum cryptography. How have I never come across this video before or your channel? I watched it for nostalgia's sake. Loved it! Glad to see it has gotten so many views.

    • @PaulTurnerChannel
      @PaulTurnerChannel  2 ปีที่แล้ว

      Hey, Aaron. Great to hear from you. Coming from a person who could teach the topic much better than me, that means a lot.

  • @ClinsenYT
    @ClinsenYT 9 วันที่ผ่านมา

    This is such a nice explanation! Thank you!

  • @paulaganbi5236
    @paulaganbi5236 4 ปีที่แล้ว +1

    I been studying PKI for the past 3 weeks for an upcoming exam and I have struggled to grasp it, I watched this video and I instantly understood the basics of the concept. Thank you for this

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 ปีที่แล้ว

      Paul, you put a big smile on my face when I read your note. I apologize for being slow in responding. I'm glad the video was helpful!

  • @Schmo_theoriginal
    @Schmo_theoriginal 3 หลายเดือนก่อน

    Why is this video so well put together?

  • @nareshmallavolu
    @nareshmallavolu ปีที่แล้ว

    Awesome, thanks !! it is a good help for me to understand the PKI this better

    • @PaulTurnerChannel
      @PaulTurnerChannel  ปีที่แล้ว

      Thank you for taking the time to leave a comment, Naresh. I’m glad it was helpful.

  • @toddpatrick7695
    @toddpatrick7695 5 ปีที่แล้ว +1

    Outstanding video... thank you!

    • @PaulTurnerChannel
      @PaulTurnerChannel  5 ปีที่แล้ว

      Todd, thanks for taking the time to give your feedback. I really appreciate it.

  • @ifeastontoenails
    @ifeastontoenails 2 ปีที่แล้ว

    Your PKI videos really helped me think through my science fiction writing. Thanks!

    • @PaulTurnerChannel
      @PaulTurnerChannel  2 ปีที่แล้ว

      Haha. I’m not sure how to take that. I hadn’t been shooting for fiction on the videos but must have made quite an impression with my delivery to inspire your sci-fi writing 😃

    • @kam...3247
      @kam...3247 2 หลายเดือนก่อน

      Where can I read your sci-fi novel ?

  • @felipefn88
    @felipefn88 5 ปีที่แล้ว

    Great! Thank you for taking the time.

    • @PaulTurnerChannel
      @PaulTurnerChannel  5 ปีที่แล้ว

      Thank you for taking the time to send me a comment, Felipe. I'm glad you found it helpful.

  • @SSSingh1320
    @SSSingh1320 2 ปีที่แล้ว +1

    great explanation Paul. easy to understand and precise.

    • @PaulTurnerChannel
      @PaulTurnerChannel  2 ปีที่แล้ว +1

      Thank you very much for the feedback, Shashank. I really appreciate it. I’m glad it was helpful.

    • @SSSingh1320
      @SSSingh1320 2 ปีที่แล้ว

      @@PaulTurnerChannel was searching this topic for the first time and glad I landed directly on this. you explained the entire architecture very well. Thanks again. stay safe.

  • @uglyface7665
    @uglyface7665 3 ปีที่แล้ว +1

    Thank you so much. The video was very helpful.

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 ปีที่แล้ว

      Thank you for taking the time to give me your feedback. I’m really happy to hear it was helpful.

  • @Mr_Duck_RVA
    @Mr_Duck_RVA ปีที่แล้ว

    Great video you explained it so well.

  • @ofsoundmind28
    @ofsoundmind28 3 ปีที่แล้ว +1

    OMG I love your videos thank you so much.

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 ปีที่แล้ว

      Thank you for your enthusiastic feedback. Comments like this make my day, Mason.

  • @lokeshselvakumar4058
    @lokeshselvakumar4058 2 ปีที่แล้ว +1

    great content explained in a simple way!

    • @PaulTurnerChannel
      @PaulTurnerChannel  2 ปีที่แล้ว

      Thank you for the feedback, Lokesh. I’m glad it was understandable.

  • @dorab.theitexplorer6462
    @dorab.theitexplorer6462 3 ปีที่แล้ว +2

    Thanks a lot it really helped me to clear my vision Greeting from north Africa

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 ปีที่แล้ว +2

      Doudi, you put a big smile on my face with your greeting. Though the internet is clearly global, I frankly never anticipated that the videos I was creating would be viewed from so many different continents and countries. I’m glad you found the video helpful. Thank you so much for reaching out from half way around the world ;-)

  • @wobuntu
    @wobuntu 5 ปีที่แล้ว +1

    Better than any lecture on this topic, thanks so much, very, very good video

    • @wobuntu
      @wobuntu 5 ปีที่แล้ว +1

      Could you probably recommend some sources/books/papers/articles? You made me curious, i'd love to read more about it

    • @PaulTurnerChannel
      @PaulTurnerChannel  5 ปีที่แล้ว +2

      Thank you very much for the feedback, Mathias. I wish I could point you to something I've read but I started in PKI a long time ago and, having learn most of what I know on the job, haven't kept up with book much. However, I can strongly recommend you looking at Ivan Ristic's book "Bulletproof SSL and TLS". He's very knowledgeable in this space. I also believe there is some other guidance that will be coming out soon and will give you a heads up when it hits the street.

    • @wobuntu
      @wobuntu 5 ปีที่แล้ว

      @@PaulTurnerChannel t
      Thank you Paul!

  • @jdobbs42
    @jdobbs42 3 ปีที่แล้ว +1

    Outstanding! Thank You

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 ปีที่แล้ว

      Thank you very much for your feedback, Jason!

  • @abhishekyadav0007
    @abhishekyadav0007 6 ปีที่แล้ว

    Easy to understand.. thanks paul

  • @Flappy9
    @Flappy9 ปีที่แล้ว +1

    Thanks Paul!

  • @salmanriaz7892
    @salmanriaz7892 หลายเดือนก่อน

    @paul many thanks for making it so easy to understand ! Did you many any explaining private CA and how they work?
    I have already found one of your video on x.509

  • @joshd1732
    @joshd1732 4 ปีที่แล้ว +1

    Thank you for this.

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 ปีที่แล้ว

      You are very welcome, Josh. I hope it was helpful.

  • @meccaadams9299
    @meccaadams9299 3 ปีที่แล้ว +1

    OMG! I'm studying for the Security + exam and this video has helped me understand CRL, Root, and OCSP. Thank you for making this video

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 ปีที่แล้ว +1

      Mecca, I’m so glad you found the video helpful. Good luck on your exam. I’m sure you will do great.

  • @aa-ur8wu
    @aa-ur8wu 5 ปีที่แล้ว +1

    thank you from France

    • @PaulTurnerChannel
      @PaulTurnerChannel  5 ปีที่แล้ว

      :-)
      Merci pour votre note. Ça m'a fait un grand sourire. Vive la France!

  • @PaulEllisBIGDATA
    @PaulEllisBIGDATA 2 ปีที่แล้ว +1

    Thank you.

    • @PaulTurnerChannel
      @PaulTurnerChannel  2 ปีที่แล้ว

      Thank you for taking the time to leave a comment, Paul!

  • @3eenab
    @3eenab 6 ปีที่แล้ว

    Thanks a lot.

  • @clebo99
    @clebo99 4 ปีที่แล้ว +2

    Very nice video. Thank you.

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 ปีที่แล้ว

      I appreciate the feedback. I have to say that I didn’t expect that particular video to be as well received and helpful as it appears to be. I’m glad it is helpful!

    • @clebo99
      @clebo99 4 ปีที่แล้ว

      @@PaulTurnerChannel No problem. I learn a lot from TH-cam and this was great. If I may ask a follow-up question (since you responded so quickly). I'm also trying to learn about HSM's and my main/basic question is: Can an HSM be a CA as well or are they traditionally/always separate systems?

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 ปีที่แล้ว

      A CA would use an HSM to secure its signing key but you would likely not want an HSM to BE a CA. The reason is that HSMs must conform to a standard called FIPS 140, which is very restrictive and requires retesting for certification when changes are made to the internal code. HSMs typically perform a limited number of functions (key gen, signing, etc.) and therefore have a smaller code base and don’t require frequent changes/updates. On the other hand, CAs typically have large amounts of code and need updating frequently with new functionality to respond to changing market needs. The size of CA code would significantly extend testing/certification times and the retesting for certification would slow down the ability to get new features out. Consequently, most CAs have not been built into HSMs and instead use them as a security resource to protect their signing keys. Hope this makes sense.

    • @clebo99
      @clebo99 4 ปีที่แล้ว

      @@PaulTurnerChannel Perfect. Much appreciated!!!!!

  • @UralaTAO
    @UralaTAO 3 ปีที่แล้ว +2

    Thanks for that man.

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 ปีที่แล้ว

      Thank you, BTC. I appreciate you taking the time to comment. Glad it was helpful.

  • @rahellhamarash2915
    @rahellhamarash2915 3 ปีที่แล้ว +3

    thank you for the great explanation , but may I ask what is the currently used method to check for validity of certificates ? from what I understand it's what we call ocsp stapling which you didn't talk about

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 ปีที่แล้ว +2

      Hi, Rachell. Thanks for pointing that out. This is an older video and I didn’t include OCSP stapling. It has become much more widely used. I appreciate you bringing it up.

  • @sanskarsingh9538
    @sanskarsingh9538 4 ปีที่แล้ว +1

    Smooth like butter

  • @citizensnipsnw
    @citizensnipsnw 5 ปีที่แล้ว

    excellent video

  • @houssemedyn5678
    @houssemedyn5678 4 ปีที่แล้ว +1

    Thank you

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 ปีที่แล้ว

      Thank you for taking the time to comment, Houssem.

  • @pacmanh22
    @pacmanh22 3 ปีที่แล้ว +1

    Great video! I have PKI infrastructure in place from a previous engineer. I need to setup EAP+TLS for radius wireless, where can i get a private cert? GoDaddy? Or can the Root CA generate one?

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 ปีที่แล้ว +1

      Hi, Daniel. Sorry for the slow response. Your internal PKI infrastructure should have an issuing CA. That is where you want to issue the EAP-TLS Cert from. If you only have a root CA, you should strongly consider setting up a new issuing CA (and possibly a new root, since the existing root would have gotten lots of exposure if it was issuing end entity certs (e.g., TLS certs)). I hope this helps.

  • @rmcgraw7943
    @rmcgraw7943 3 ปีที่แล้ว +1

    Very good intro to certs.

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 ปีที่แล้ว

      Thank you very much for the feedback, Lee. I’m glad it was helpful b

  • @vitoralexandrino3328
    @vitoralexandrino3328 5 ปีที่แล้ว +1

    Paul, great explanation, is there any way I can get this powerpoint file to present in my class on my own language?

    • @PaulTurnerChannel
      @PaulTurnerChannel  5 ปีที่แล้ว

      Vitor, let me look into this. Those slides are technically owned by Venafi, the company I used to work for. I'll check with them. It may take me a bit to get back to you. I appreciate the feedback.

  • @PrakashSingh-to1nl
    @PrakashSingh-to1nl 5 ปีที่แล้ว +1

    This is by far the best video on this topic I have come across.. 🙂 I am glad that I have found it .. Paul any thoughts on browser vs server certificate? Will love to see ur explanation..

    • @PaulTurnerChannel
      @PaulTurnerChannel  5 ปีที่แล้ว

      I appreciate you saying that, Prakash. Can you clarify your question about browser (client) vs server certificates? Are you asking about when client certificates should be used or some other aspect? Thanks for your question. Sorry for not understanding it.

    • @PrakashSingh-to1nl
      @PrakashSingh-to1nl 5 ปีที่แล้ว

      @@PaulTurnerChannel thanks for your reply.. I was referring to sever to server vs browser to server communication .. behavioural difference between these two type of communication... though I really appreciate ur reply.. Thanks

    • @PaulTurnerChannel
      @PaulTurnerChannel  5 ปีที่แล้ว +1

      Prakash, your question is a little broad so I'm not sure I'll be answering what you're inquiring about. With respect to server-to-server (S2S) vs. browser-to-server (B2S), there are no differences in the TLS protocol or the TLS server certificates used in both cases. The primary difference I see between the two is how they will respond to errors.
      For example, with S2S, the server acting as a client will shutdown the TLS connection and log an error if an expired certificate or name mismatch is encountered. The application served by the S2S communications will stop operating at that point. With B2S, the browser will display an error for the user when an expired certificate is encountered. The user is free to make a choice on how they respond (click through or abandon). The browser manufacturers have made their errors more stern and difficult to dismiss so users are less likely to click through the error but it is not impossible. If they don't click through, they will likely try to contact support for the application (since they can't get to it).
      The reason I raise this difference (again, not knowing if this is what you were looking for) is that the situation is subtly but importantly different between the two. In the S2S case, someone has to dig through log files to figure out why the application stopped working. In the B2S case, it is pretty clear from the error messages displayed in the browser what happened (especially, if the support person tries to connect to the server and they get the error message). I've heard of organizations troubleshooting S2S expired certificate issues for several hours before they figure out what happened. If there are multiple clustered systems acting as servers and there is only an expired certificate on one (e.g., the others were updated), this can make it even more difficult to troubleshoot because you have a load balancer spreading clients across the clustered servers and it only fails intermittently.
      As I write this, I realize I'm probably way off from what you were interested in. If so, can you please restate your question? It doesn't appear that you were asking about client TLS certs and the difference between servers acting as clients and browsers. I'm sorry if I'm being slow on this.

    • @PrakashSingh-to1nl
      @PrakashSingh-to1nl 5 ปีที่แล้ว

      @@PaulTurnerChannel thanks!! for the detailed explanation.. that pretty much explained my question..🙂

  • @chandu354
    @chandu354 2 ปีที่แล้ว +1

    Very helpful 👍👍👍❤️❤️

    • @PaulTurnerChannel
      @PaulTurnerChannel  2 ปีที่แล้ว

      I’m very happy to hear it was helpful, Chandu!

  • @Duduicostin
    @Duduicostin 2 ปีที่แล้ว +2

    Finally, I can understand PKI

    • @PaulTurnerChannel
      @PaulTurnerChannel  2 ปีที่แล้ว

      I’m glad it was helpful, Costin. Thank you for the feedback.

  • @thomasaragaw7415
    @thomasaragaw7415 3 ปีที่แล้ว +1

    Hi Paul,
    Thank you for explaining this subject. Is it possible to find out the RA and VA from the website digital certificate?

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 ปีที่แล้ว

      Hi, Thomas. Thanks for your question. You cannot determine the RA from the certificate unless the CA chooses to add a proprietary extension (I'm not aware of any standard extensions that list the RA but may have missed it).
      From the certificate, you can determine the certificate authority (CA), the CRL distribution point (CDP), OCSP responder location, and the location where the CA chain can be retrieved (CA Issuers). I hope this helps.
      I'm curious. Why would you want to determine the RA from the certificate as a relying party? I'm not sure what a VA is. Again, I may have missed that term in my travels so feel free to enlighten me.
      Thanks a bunch for the question

  • @ohaRega
    @ohaRega 2 ปีที่แล้ว +1

    Awesome

    • @PaulTurnerChannel
      @PaulTurnerChannel  2 ปีที่แล้ว

      Thank you for the feedback. I’m glad you liked it.

  • @jda3741
    @jda3741 4 ปีที่แล้ว +1

    I thought the diagram you used to describe the whole process was very useful. I was just wondering with what software you used to create it.

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 ปีที่แล้ว

      Hi, JD. I use PowerPoint to create the graphics and animations. Thanks a bunch for you feedback. I’m glad you liked it.

  • @junaid_qadir
    @junaid_qadir 2 ปีที่แล้ว +1

    Hi Paul, this is a very awesome explanation indeed. Thanks for the wonderful lecture. Now can you please implement this scenario in code? Secondly, how you have made these slides, is it PPT or any other software?

    • @PaulTurnerChannel
      @PaulTurnerChannel  2 ปีที่แล้ว

      Thanks for the feedback, Junaid. The slides were created with PowerPoint.

    • @junaid_qadir
      @junaid_qadir 2 ปีที่แล้ว

      @@PaulTurnerChannel Thanks for your prompt response. Do you supervise students? How can I reach you privately?

    • @PaulTurnerChannel
      @PaulTurnerChannel  2 ปีที่แล้ว

      Hi, Junaid. You ca. contact me on LinkedIn with my name and Epuio.

    • @junaid_qadir
      @junaid_qadir 2 ปีที่แล้ว

      @@PaulTurnerChannel thank you so much, sure I will get in touch with you soon.

  • @valb4184
    @valb4184 6 ปีที่แล้ว +1

    Hi Paul, really informative tutorial. I have a question, can you explain the difference between Centralized (CA generates both keys) vs Decentralized (user generates both keys), does the CA digitally sign the Digital Certificate along with the keys and send it to the user? Thank you.

    • @PaulTurnerChannel
      @PaulTurnerChannel  6 ปีที่แล้ว +2

      Hi, Val. Good question. If you have the CA centrally generate the key pair, the user will provide their information for inclusion in the certificate and the CA will generate the key pair (public and private key), issue a certificate containing the public key, and provide the private key and certificate for download by the user. The private key should be protected by a password when downloaded. In most cases, the private key and password will be provided in PEM or PKCS#12 format (file format of the keystore). Generally, you don't want to have a public CA creating key pairs for you unless you're leveraging the CA as a key escrow/backup service (which only makes sense for things such as email encryption, where you don't want to risk losing all copies of your private key).
      With decentralized key generation, the user generates the key pair along with a CSR (which contains the public key). They submit the CSR to the CA. The CA uses the information within the CSR and whatever other information they choose to issue a certificate. The CA returns the certificate back to the user. The user installs certificate and private key in the needed location for the application that will use the them for both centralized and decentralized. I hope this helps.

    • @valb4184
      @valb4184 6 ปีที่แล้ว +1

      You are awesome!

    • @valb4184
      @valb4184 6 ปีที่แล้ว

      Thanks Paul, explained really well. I keep coming back to your videos for references.

  • @austin12091
    @austin12091 2 ปีที่แล้ว +1

    would have been great to of seen this for my sec+ test

    • @PaulTurnerChannel
      @PaulTurnerChannel  2 ปีที่แล้ว

      I guess we’d need a time machine for that MillerTheGreat ;-). Sorry that you didn’t find it before the test. Hope it was helpful nonetheless.

  • @fbifido2
    @fbifido2 10 หลายเดือนก่อน

    @4:50 - what's the max & min timeframe (using pki best practice as a guide) for a Root-CA and an Issuing-CA?

  • @entertainmentnlearning7941
    @entertainmentnlearning7941 4 ปีที่แล้ว +1

    nice

  • @giladbaruchian7522
    @giladbaruchian7522 5 ปีที่แล้ว +1

    so if you DDOS all the OCSP you can break large chunks of the internet? :)

  • @Mike-kq5yc
    @Mike-kq5yc 10 หลายเดือนก่อน +1

    Hello. Can you recommend any ressource for understanding and implementing the underlying architecture and (as well as file organization) of every component in the PKI ecosystem such as CA, Root CA, ..., If were to be established and deployed in a real life insecure infrastructure?

    • @PaulTurnerChannel
      @PaulTurnerChannel  10 หลายเดือนก่อน +1

      Hi, Mike. Sorry for the slow response. There are a variety of good PKI consulting organizations out there. You might talk with Encryption Consulting (www.encryptionconsulting.com) or Komar Consulting (www.komarconsulting.com). Brian Komar also has written several papers and books. I hope that helps.

    • @Mike-kq5yc
      @Mike-kq5yc 10 หลายเดือนก่อน

      @@PaulTurnerChannel Never mind. I am glad, that you took your time to respond. Would you mind, if I message you on youtube? I need a couple of tipps for my current project if you do not mind

    • @PaulTurnerChannel
      @PaulTurnerChannel  10 หลายเดือนก่อน

      No problem, Mike. My primary expertise is in the cert and key mgmt of PKI. There many others better than me at CA deployment and mgmt.

    • @Mike-kq5yc
      @Mike-kq5yc 9 หลายเดือนก่อน

      @@PaulTurnerChannel can I have your E-Mail Address? I cannot find any way to communicate with you. I posted my E-Mail here in a comment but it got deleted somehow

    • @PaulTurnerChannel
      @PaulTurnerChannel  9 หลายเดือนก่อน

      @@Mike-kq5yc Sorry for the slow response. Please connect with me on Linkedin at www.linkedin.com/in/equio/.

  • @prash2905
    @prash2905 3 ปีที่แล้ว +1

    At 4:11, do you mean giving their "PUBLIC KEY" certificate?

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 ปีที่แล้ว +1

      Hi, Prashanth. Good catch. It sounds like I say "root" certificate there (before I even introduce the concept of a root certificate). Yes, I meant to say they provide their own certificate, which is a public key certificate. Thank you for catching that!

    • @prash2905
      @prash2905 3 ปีที่แล้ว

      @@PaulTurnerChannel Paul, I seriously love your videos and I hope you make more videos where you take complex topics and break them down like this. Thank you x 100. I was just making sure I understood it right. I don't mean to point mistakes. I hope you have a fantastic day!

    • @prash2905
      @prash2905 3 ปีที่แล้ว

      @@PaulTurnerChannel Your videos will be here forever and help countless folks! Thank you again.

  • @td4yd154
    @td4yd154 2 ปีที่แล้ว

    The entire process starts with sally requesting a website by entering a password? Bob tells the CA that the cert is not good anymore? Confusing.

    • @PaulTurnerChannel
      @PaulTurnerChannel  2 ปีที่แล้ว

      I’m sorry you found it confusing, TD. The portion about Sally is not meant to imply she is requesting a website. She knows she wants to use that particular website and wants to do so securely. The rest of the video explains how the PKI system was designed to support that secure communication. Again, I’m sorry you found the video confusing. I hope you’re able to find information that is helpful to you.

  • @shubhamsingla2120
    @shubhamsingla2120 5 ปีที่แล้ว +1

    What will happen if some client has copied the certificate of the website and then started being that website because he has the certificate and now this stealing client can host a similar website with this certificate and fooling other loyal clients? :(

    • @PaulTurnerChannel
      @PaulTurnerChannel  5 ปีที่แล้ว +1

      In the case you’re mentioning, the attacker would need to steal the private key that matches the certificate (typically installed on the server to which the certificate is assigned). Then they would need to redirect traffic to come to their server instead of the legitimate server. Please see my response to your question about MITM for additional background. I hope this helps.

  • @marcooceda5832
    @marcooceda5832 4 ปีที่แล้ว

    Pki is the same that Kpi? I have a work about kpi with Power pivot

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 ปีที่แล้ว

      Marco, I have to confess that I don't understand your question. I have never heard PKI (public key infrastructure) referred to as KPI so I would have to reply that they're not the same. The only time I've heard of KPI for "key performance indicators". That is definitely not the focus of this presentation.

    • @marcooceda5832
      @marcooceda5832 4 ปีที่แล้ว

      @@PaulTurnerChannel Is the pki related to excel power pivot?

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 ปีที่แล้ว

      Hi, Marco. No. This presentation is not about Power Pivot in Excel. I hope you find a good resource to help you on that topic. Good luck.

    • @bobonaqa
      @bobonaqa 4 ปีที่แล้ว

      @@PaulTurnerChannel Is mayonnaise an instrument?

  • @bhootnimon
    @bhootnimon ปีที่แล้ว +1

    Plz speak little loud 🔊 or Inc volume of mike

    • @PaulTurnerChannel
      @PaulTurnerChannel  ปีที่แล้ว +1

      Sorry, Swagata. That was one of my early videos when I didn’t have a good microphone.

  • @anakkeempat
    @anakkeempat 2 ปีที่แล้ว

    hello, anyone can help me how to installation signserver in Ubuntu server.. urgent

    • @PaulTurnerChannel
      @PaulTurnerChannel  2 ปีที่แล้ว

      Hi, Dita. I don’t have any experience with SignServer. Are you having trouble with the documentation? Have you tried reaching out to someone on the user forum sourceforge.net/projects/signserver/support ?

  • @silvertad3833
    @silvertad3833 2 ปีที่แล้ว

    @ 3:30 : " ... the software manufacturers putting the relevant certificate authorities in the software" , inaccurate statements

    • @PaulTurnerChannel
      @PaulTurnerChannel  2 ปีที่แล้ว

      Hi, Silver. I’m confused by your comment. Many operating systems and other software/hardware come preloaded with root certs. Can you clarify?

    • @silvertad3833
      @silvertad3833 2 ปีที่แล้ว +1

      @@PaulTurnerChannel Hi Paul, they are putting "root certificates" in the software/hardware not "certificate authorities", the certificate authorities are organizations

    • @PaulTurnerChannel
      @PaulTurnerChannel  2 ปีที่แล้ว +1

      Ah. You are correct. I didn’t realize I had said that in the video. Good catch.

  • @syahputraadha4854
    @syahputraadha4854 4 ปีที่แล้ว +5

    Pki is(partai komunis indonesian) indonesian communist party in 1948-1965

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 ปีที่แล้ว +1

      :-). And all this time I thought it stood for public key infrastructure. I stand corrected. On a serious note, I was not aware of the existence of the PKI in Indonesia. Thank you for broadening my horizons.

    • @yosatip182
      @yosatip182 4 ปีที่แล้ว

      BP U PKI

  • @sharifahsuhailasyedmuhsein6802
    @sharifahsuhailasyedmuhsein6802 4 ปีที่แล้ว

    What is pki?: *commie indonesia*

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 ปีที่แล้ว

      Hello, Sharifah. I wasn’t aware of the PKI in Indonesia. I’m sorry for the overlap. I didn’t pick the name “public key infrastructure”, which results in “PKI” and is a broadly used term in the technology industry. This video is to help technologists understand that technology. I wish you all the best.

  • @genericrocker7655
    @genericrocker7655 ปีที่แล้ว +1

    Speak up! Max volume and I can still barely hear you.

    • @PaulTurnerChannel
      @PaulTurnerChannel  ปีที่แล้ว

      Sorry, Generic Rocker. This was one of my early videos before I understood the importance of a good microphone. Hopefully, some of my later videos have better sound quality. Thanks for pointing it out. All the best.

  • @BabuBakthavachalam
    @BabuBakthavachalam 3 ปีที่แล้ว +1

    Thank you

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 ปีที่แล้ว

      Thank you for your expressions of appreciation for several videos. I’m very happy you find them useful.