Skip to content
Tech News
← Back to articles

Revocation of X.509 Certificates

read original get SSL/TLS Certificate Revocation Kit → more articles
Why This Matters

The revocation of X.509 certificates is a critical development in the PKI ecosystem, impacting how trust and security are maintained online. Recent changes by major authorities like Let’s Encrypt and the CAB Forum highlight the evolving landscape of digital certificate management, which directly affects the security infrastructure used by consumers and organizations alike.

Key Takeaways

This is not the first time I’ve looked at Domain Name Certificate revocation in these blog articles, first in 2020 and again in 2022 — it’s an evolving story. There have been several recent changes by the Certificate Authority and Browser Forum (CAB Forum) and the largest Certification Authority, Let’s Encrypt, which have a fundamental impact on the way in which we use (and trust) these certificates. I thought it would be useful to look at the topic of certificate revocation once more in the light of these changes.

Public Key Infrastructure (PKI) is a system designed to support the use of public/private keyed digital signatures through a system of structured transitive trust. The objective of a PKI is to enable trusted communications between parties who may have never directly met and may not necessarily even know each other at all.

A PKI normally uses X.509 public key certificates, which are digital objects that contain:

A verifiable attestation that the certificate issuer has satisfied itself using application procedures documented in its Certificate Practice Statement

An assertion that the holder of a given public/private key pair has met certain criteria as specified by the certificate issuer

The certificate issuer then publishes a certificate that associates a subject name (such as an individual’s details for identity certificates or a DNS name for a domain name certificate) with the holder’s public key. It then attaches a digital signature to this object, generated using the certificate issuer’s private key. This act is both verifiable by any party that has knowledge of the issuer’s public key and cannot be subsequently repudiated by the issuer.

X.509 public key certificates support several purposes, including authenticity, verifiability, and attribution. They can also help establish an encrypted session. For example, if an individual signs a digital document with their certified private key, anyone who refers to the associated public key identity certificate can validate (verifiability) that it was this particular individual who signed the document (attribution), and the document is unaltered (authenticity), as long as they are prepared to trust the integrity of the certificate issuance practices of the certificate issuer. If a client uses a server’s public key as part of the process of setting up a session key, the client and server can exchange encrypted messages that can only be deciphered by each other (encryption), such as in the use of keys by Transport Layer Security (TLS).

We see widespread use of domain name public key certificates in the web, where clients can access servers’ published content and online services using Transport Layer Security (TLS), as seen in the use of HTTPS URLs. The use of the web PKI allows a client to validate the authenticity of the remote server’s identity and encrypt the ensuing access session, ensuring that:

The transaction cannot be eavesdropped on by third parties

The contents of the transaction are not altered in any way

... continue reading