PaulDotCom mailing list archives

Re: CA Question


From: "Gibson, Samuel" <gibsons () my uwstout edu>
Date: Wed, 27 Apr 2011 01:41:27 +0000

Mr. Butturini, this looks to be what I was looking for.  As a person who is starting out and trying to figure a lot of 
these things out, I find this list to be very informative.  I just want to say that I really appreciate how willing to 
share information everyone is.

Thanks,
Sam 

-----Original Message-----
From: pauldotcom-bounces () mail pauldotcom com [mailto:pauldotcom-bounces () mail pauldotcom com] On Behalf Of 
Butturini, Russell
Sent: Tuesday, April 26, 2011 7:20 AM
To: PaulDotCom Security Weekly Mailing List
Subject: Re: [Pauldotcom] CA Question

If this is a Cisco router (I figure this is a good guess), the keys must have been generated with the exportable option 
when the certificate was issued in order to move them.  The command would look something like this

Crypto key generate rsa modulus 2048 exportable label CERT_KEYS

Then you can export the keys to flash or the terminal using the crypto key export command.  Just make sure to name your 
trustpoint on the new router the same as the filename of your keys when you move them to the new router.

Of course, if this isn't a cisco router, this is all irrelevant :-)


-----Original Message-----
From: pauldotcom-bounces () mail pauldotcom com [mailto:pauldotcom-bounces () mail pauldotcom com] On Behalf Of Dan 
Burrowes
Sent: Monday, April 25, 2011 9:39 PM
To: PaulDotCom Security Weekly Mailing List
Subject: Re: [Pauldotcom] CA Question

This may be a bit of a silly newb question, but I was wondering if it is possible to transfer a certificate that has 
been signed by a CA (i.e. Thawte, Verisign) to a new device.

If you're talking about SSL, then yes, it is possible.

As long as the domain name (or alternately, the FQDN, depending on
whether or not the cert is a "wildcard cert") that the certificate was
issued to when used on RouterA is the same as the domain name that will
be used for RouterB, then it will work, provided that RouterB has the
private and public keys that RouterA was using.

Certs only say that "this device has cert Y which the CA verifies
belongs to domain Z".  Someone correct me if I'm wrong, but with SSL,
there is no option for hardware hashing or anything to tie the keys to
particular hardware.  The keys can just be transferred to another
device, in which case the cert will again say "this device has cert Y
which the CA verifies belongs to domain Z".  This is the reason why you
can create the keys on a system that is different from the system you
will actually use the cert on.

This is also the reason why if an attacker steals your private keys,
it's "game over" -- she can impersonate you (assuming she also controls
DNS), and the CA will still say "duh...yup, it's valid...nothing to see
here...".

Correct me if I'm wrong (again), but this is one of the things that the
Perspectives[1] project helps protect against.  Multiple servers from
multiple locations frequently check if the cert has changed, or if the
IP the cert was previously found at is the same as the current IP.

--dan

[1] http://www.networknotary.org/
_______________________________________________
Pauldotcom mailing list
Pauldotcom () mail pauldotcom com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com


******************************************************************************
This email contains confidential and proprietary information and is not to be used or disclosed to anyone other than 
the named recipient of this email, 
and is to be used only for the intended purpose of this communication.
******************************************************************************
_______________________________________________
Pauldotcom mailing list
Pauldotcom () mail pauldotcom com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com
_______________________________________________
Pauldotcom mailing list
Pauldotcom () mail pauldotcom com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com


Current thread: