White Papers

Table Of Contents
Advantages of X.509v3 certificates
Public key authentication is preferred over password-based authentication, although both may be used in conjunction, for
various reasons. Public-key authentication provides the following advantages over normal password-based authentication:
Public-key authentication avoids the human problems of low-entropy password selection and provides more resistance to
brute-force attacks than password-based authentication.
It facilitates trusted, provable identitieswhen using certificates signed by trusted CAs.
It also provides integrity and confidentiality in addition to authentication.
X.509v3 support in
supports X.509v3 standards.
Many organizations or entities need to let their customers know that the connection to their devices and network is secure.
These organizations pay an internationally trusted Certificate Authorities (CAs) such as VeriSign, DigiCert, and so on, to sign a
certificate for their domain.
To implement a X.509v3 infrastructure, recommends you to act as your own CA. Common use cases for acting as your own CA
include issuing certificates to clients to allow them to authenticate to a server. For example, Apache, OpenVPN, and so on.
Acting as a certificate authority (CA) means dealing with cryptographic pairs of private keys and public certificates. The
first cryptographic pair you create is the root pair. This root pair consists of the root key (ca.key.pem) and root certificate
ca.cert.pem. This pair forms the identity of your CA.
Typically, a root CA does not sign server or client certificates directly. The root CA is only ever used to create one or more
intermediate CAs. These intermediate CAs are trusted by the root CA to sign certificates on their behalf. This is the best
practice. It allows the root key to be kept offline and used to a minimal extent, as any compromise of the root key is disastrous.
For more generic information on setting up your own Certificate Authority (CA), see https://jamielinux.com/docs/openssl-
certificate-authority/index.html#
The following figure illustrates a sample network topology in which a simple X.509v3 infrastructure is implemented:
The Root CA generates a private key and a self-signed CA certificate.
The Intermediate CA generates a private key and a Certificate Signing Request (CSR).
Using its private key, the root CA signs the intermediate CAs CSR generating a CA certificate for the Intermediate CA. This
intermediate CA can then sign certificates for hosts in the network and also for further intermediate CAs. These CA certificates
(root CA and any intermediate CAs), but not the corresponding private keys, are made publicly available on the network.
NOTE:
CA certificates may also be bundled together for ease of installation. Their .PEM files are concatenated in order
from the lowest ranking CA certificate to the Root CA certificate. handles installation of bundled certificate files.
1070 X.509v3