Пікірлер
@glazaa
@glazaa Сағат бұрын
Spending time this morning tuning up on cryptography concepts, and loving that I can get the refresher from the guy who taught me everything I know about this. You are so good at this stuff. Miss our interactions. Hope you are well, my friend.
@Sneako-yu3tg
@Sneako-yu3tg 2 сағат бұрын
Learning PKI with this playlist in 2024 😁😁😁😁 Thank you Paul
@salmanriaz7892
@salmanriaz7892 22 күн бұрын
@paul many thanks for making it so easy to understand ! Did you many any explaining private CA and how they work? I have already found one of your video on x.509
@DanielLagoAguado
@DanielLagoAguado Ай бұрын
Wonderful series of videos, best explanation about PKI and cert validation I've found so far. Congrats!
@faizunisajazadi8732
@faizunisajazadi8732 Ай бұрын
This PKI Bootcamp series is impressive!
@Schmo_theoriginal
@Schmo_theoriginal 3 ай бұрын
Why is this video so well put together?
@ilikemachieneguns
@ilikemachieneguns 4 ай бұрын
Hey, I've always struggled with the differences between MAC and HMAC. From this video, you make it sound like MACs are not secure anymore and that HMACs are the new solution. Do I have this wrong or have MACs changed to adapt to the exploit you discussed?
@Mackaiin
@Mackaiin 4 ай бұрын
I love this series. It is very nice to finally understand how the processes work.
@khiyamiftikharusmani1111
@khiyamiftikharusmani1111 5 ай бұрын
Excellent explanation in such small time.
@BattyVibess
@BattyVibess 5 ай бұрын
After an hour of reading about PKI, trying to understand it and failing, I finally have a grasp on this now. Thank you, Paul!
@tobiaslee6444
@tobiaslee6444 6 ай бұрын
This was a great video, thank you!
@ebhole
@ebhole 6 ай бұрын
3:42 straight and concise to the point. very informative and clear. Thanks a lot for this content
@GNSK3
@GNSK3 8 ай бұрын
Thank you so much. Great explanation.
@user-gc3ho4ve5l
@user-gc3ho4ve5l 8 ай бұрын
Great video Mr. Paul. God bless you
@jesuschrist5405
@jesuschrist5405 9 ай бұрын
Excellent master for PKI
@PaulTurnerChannel
@PaulTurnerChannel 9 ай бұрын
Glad you liked it, Jesus. Thanks for the feedback.
@Mike-kq5yc
@Mike-kq5yc 10 ай бұрын
Hello. Can you recommend any ressource for understanding and implementing the underlying architecture and (as well as file organization) of every component in the PKI ecosystem such as CA, Root CA, ..., If were to be established and deployed in a real life insecure infrastructure?
@PaulTurnerChannel
@PaulTurnerChannel 9 ай бұрын
Hi, Mike. Sorry for the slow response. There are a variety of good PKI consulting organizations out there. You might talk with Encryption Consulting (www.encryptionconsulting.com) or Komar Consulting (www.komarconsulting.com). Brian Komar also has written several papers and books. I hope that helps.
@Mike-kq5yc
@Mike-kq5yc 9 ай бұрын
@@PaulTurnerChannel Never mind. I am glad, that you took your time to respond. Would you mind, if I message you on youtube? I need a couple of tipps for my current project if you do not mind
@PaulTurnerChannel
@PaulTurnerChannel 9 ай бұрын
No problem, Mike. My primary expertise is in the cert and key mgmt of PKI. There many others better than me at CA deployment and mgmt.
@Mike-kq5yc
@Mike-kq5yc 9 ай бұрын
@@PaulTurnerChannel can I have your E-Mail Address? I cannot find any way to communicate with you. I posted my E-Mail here in a comment but it got deleted somehow
@PaulTurnerChannel
@PaulTurnerChannel 9 ай бұрын
@@Mike-kq5yc Sorry for the slow response. Please connect with me on Linkedin at www.linkedin.com/in/equio/.
@fbifido2
@fbifido2 10 ай бұрын
@4:50 - what's the max & min timeframe (using pki best practice as a guide) for a Root-CA and an Issuing-CA?
@FRITTY12348546
@FRITTY12348546 Жыл бұрын
These videos are incredible thank you Paul
@chandrasekharavajpayeemadd2494
@chandrasekharavajpayeemadd2494 Жыл бұрын
are these keys persistent ? What should we do make sure keys are persistent?
@shahzadmahmoodch
@shahzadmahmoodch Жыл бұрын
Excellent content. Poor voice volume.
@KK-ib5nh
@KK-ib5nh Жыл бұрын
I want to verify the certificate. Iam using mbedtls . But i am getting error -0x2700 - X509 - Certificate verification failed, e.g. CRL, CA or signature check failed How to solve this or are reason to fail the verification
@PaulTurnerChannel
@PaulTurnerChannel Жыл бұрын
Hmmm. That’s not a lot to go on, K K. The first thing I would do would be to try to connect to the server with a different client that might give you more information about what is causing the failure. You might try OpenSSL (www.openssl.org/docs/man3.0/man1/openssl-verification-options.html). Is this a public or private server? If public, can you provide a URL?
@KK-ib5nh
@KK-ib5nh Жыл бұрын
@@PaulTurnerChannel i am using ip address for URL ..yeahh it's private The provided openssl link is not opening.
@PaulTurnerChannel
@PaulTurnerChannel Жыл бұрын
That is likely your problem. You need to use a DNS address that matches the CN and/or SAN in the certificate of the server. That is what the TLS library is attempting to match.
@Robotgroup01
@Robotgroup01 Жыл бұрын
What a good explanation! thank you very much!
@PaulTurnerChannel
@PaulTurnerChannel Жыл бұрын
Thank you, RG!
@BIT11010
@BIT11010 Жыл бұрын
Hello. Thanks for detailed explanation.
@PaulTurnerChannel
@PaulTurnerChannel Жыл бұрын
I’m glad it was helpful, BitVibe!
@bhootnimon
@bhootnimon Жыл бұрын
Plz speak little loud 🔊 or Inc volume of mike
@PaulTurnerChannel
@PaulTurnerChannel Жыл бұрын
Sorry, Swagata. That was one of my early videos when I didn’t have a good microphone.
@AnthonyAntay
@AnthonyAntay Жыл бұрын
Awesome video, Thank you!
@ParasSaxena-wz8qm
@ParasSaxena-wz8qm Жыл бұрын
Thankyou for concise and clear explanation Great work
@Flappy9
@Flappy9 Жыл бұрын
Thanks Paul!
@Mr_Duck_RVA
@Mr_Duck_RVA Жыл бұрын
Great video you explained it so well.
@safetime100
@safetime100 Жыл бұрын
Amazing, thanks a lot, please add another video for practice and testing for all scenarios...
@Manch271
@Manch271 Жыл бұрын
Thanks.
@mechwarrior4793
@mechwarrior4793 Жыл бұрын
Strange, but a software engineer who always has to sit for prolonged periods of time I struggle with upper back pain and constant clicking between shoulder blades, I do have hernia between most of my lower vertebrates, but it doesn’t give me as much trouble as the upper back
@samnnamani
@samnnamani Жыл бұрын
I just want to hug you and say thank you. Awesome. Bravo
@leslovesliberty1776
@leslovesliberty1776 Жыл бұрын
When is your next back pain video coming out??
@PaulTurnerChannel
@PaulTurnerChannel Жыл бұрын
Hi, Les. I’ve been remiss in getting that done. Your message is helpful on telling that the second video would be helpful and serves as a good reminder to me to get it done. I will get to work on it and try to get it done by early February. Thank you for your kind nudge.
@naderawad5860
@naderawad5860 Жыл бұрын
Hello Paul, thank you for taking time to put this great content! I have a question about a "certain area" I'm trying to understand in PKI, what is the exact operation that our browsers do in the backend to verify that server certificate X is signed by root CA certificate Y? what i understand is that the browser will take the public key of the root CA certificate Y and try to decrypt the server certificate X using that public key and if its able to decrypt it then this means that certificate X must have been encrypted with the private key of root CA, but the problem with this "theory" is that the server certificate X is actually sent to the browser un-encrypted (clear text) as we can see it in a wireshark capture for TLS 1.2 session
@PaulTurnerChannel
@PaulTurnerChannel Жыл бұрын
Hi, Nader. You are actually correct but with a slight difference. The certificate is passed in the clear. I’m order to prove it is coming from them, when issuing the certificate, the root CA hashes the clear text certificate and then encrypts that hash with its private key. Once it receives the cert, the browser 1) decrypts the signature with the root CA’s public key to get the hash, 2) hashes the clear text certificate, and 3) compares the two hashes. If they match, it knows that the signature is valid. And, since they trust the root CA cert (public key), they trust the certificate. FWIW, the certificate is now encrypted in TLS 1.3 while in transit to the browser from the server. It is encrypted within the encrypted TLS stream facilitated by Diffie-Hellman key agreement. This was added by the IETF (standards group) for additional privacy. They did not want ISPs or others listening on the internet to know the domain name (the subject DN in the cert) that the browser/user is visiting. This works along with DNS over HTTPS (DoH) to prevent detection. The intermediary can a obviously see the destination IP address of the packets but that IP address could be the destination for many domain names. A VPN connection is obviously an alternative but that is not always convenient and the user may not want the VPN provider to have a clear picture of all their communications (since TLS is still used within the VPN connection). I hope this is helpful.
@genericrocker7655
@genericrocker7655 Жыл бұрын
Speak up! Max volume and I can still barely hear you.
@PaulTurnerChannel
@PaulTurnerChannel Жыл бұрын
Sorry, Generic Rocker. This was one of my early videos before I understood the importance of a good microphone. Hopefully, some of my later videos have better sound quality. Thanks for pointing it out. All the best.
@balrajvishnu
@balrajvishnu Жыл бұрын
I was wondering about the significance of certificates, you nailed it. Great video and I enjoyed watching it. Wondering what if the man in the middle spoofs the certificate that its been issued by the legit party. which body issues the certificate?
@PaulTurnerChannel
@PaulTurnerChannel Жыл бұрын
Hi, Vishnu. I may need you to clarify your question but I’ll try to provide an answer. An MITM can only succeed if the relying party (typically the party who initiated the connection) trusts the issuer of the certificate that the MITM presents. This means that the MITM can’t use a self-signed cert. Instead, they have to convince a CA trusted by the relying party to issue them a certificate with the identity of the subject of the cert (the party that the relying party is communicating with). This should be very difficult if the CA does sufficient due diligence. There have been cases where an MITM compromised the DNS account of the subject and was then able to get Let’s Encrypt to issue them a cert (since LE will issue a cert based on a DNS verification). I hope this helps. Please tell me if it doesn’t answer your question.
@balrajvishnu
@balrajvishnu Жыл бұрын
@@PaulTurnerChannel thanks Paul, this helps. I was able to listen to some of your videos which explains certificate issuance process as well
@KSanofficial
@KSanofficial Жыл бұрын
The analogy with a safe that is being shipped around the world is great. Gave me a way better understanding of the topic!
@PaulTurnerChannel
@PaulTurnerChannel Жыл бұрын
I’m glad the analogy was helpful, K-San. I wish I could take credit for it but heard it somewhere else (can’t remember where) and found it very helpful as well. All the best.
@trendyniro
@trendyniro Жыл бұрын
Thank you. Simply explained
@PaulTurnerChannel
@PaulTurnerChannel Жыл бұрын
Glad you liked it, Niranjan. Thanks for the feedback!
@rashie
@rashie Жыл бұрын
👍👍- Awesome! Thanks!
@PaulTurnerChannel
@PaulTurnerChannel Жыл бұрын
Glad you liked it, Athikora. Thank you.
@TheBeingNothing
@TheBeingNothing Жыл бұрын
Amazing.
@PaulTurnerChannel
@PaulTurnerChannel Жыл бұрын
Thanks for taking the time to provide your thoughts, Diwakar.
@anilphilip546
@anilphilip546 Жыл бұрын
the audio volume is very low even though I have set it to max on my laptop.
@PaulTurnerChannel
@PaulTurnerChannel Жыл бұрын
Sorry, Anil. That is one of my first videos, when I was still learning the importance of a good mic. I hope the other videos are easier to hear (and understandable.
@anilphilip546
@anilphilip546 Жыл бұрын
@@PaulTurnerChannel I just now happened to be at my desktop which has external speakers - now you can be heard clearly at max volume. Perhaps headphones work too. You may want to put it in the description.
@sparshashok3930
@sparshashok3930 Жыл бұрын
Nice explanation. Thanks.
@PaulTurnerChannel
@PaulTurnerChannel Жыл бұрын
Thanks, Sparsh. I’m glad you liked it.
@chrisadams27
@chrisadams27 Жыл бұрын
this is an outstanding summary of things ive learned in security but didn't relate to each other conceptually - thank you!
@PaulTurnerChannel
@PaulTurnerChannel Жыл бұрын
I’m really glad it was helpful for you, Chris. Thanks a bunch for your feedback!
@neuroArgento
@neuroArgento Жыл бұрын
Well its not so clear as it used to be in the previous video
@PaulTurnerChannel
@PaulTurnerChannel Жыл бұрын
Sorry that this video caused confusion, Profiler. Thanks for the feedback.
@neuroArgento
@neuroArgento Жыл бұрын
@@PaulTurnerChannel thank you anyway Paul!
@user-fg4xq7le7r
@user-fg4xq7le7r Жыл бұрын
what is the difference between sha 256 and hmac?
@PaulTurnerChannel
@PaulTurnerChannel Жыл бұрын
Hi, k. SHA256 is a hashing algorithm. An HMAC uses an algorithm, like SHA256, in a particular way. Instead of just taking a message and hashing it with SHA256 to get a hash (fingerprint) of the message, you hash the message with a secret key (twice, as shown in the video) to create an HMAC that serves as an authenticated fingerprint or signature of the message. A recipient who has the secret key can verify that the message came from the sender and that it wasn’t changed. On the other hand, if I was to simply hash this message with SHA256, you couldn’t verify that it came from me when you received it because anyone could create a message, hash it, and send it to you. However, if only you and I know the secret key, you know that the message you receive )with an HMAC attached) came from me because you can verify that it was hashed with the secret key. I hope that helps, and sorry it wasn’t clear in the video.
@khagania788
@khagania788 Жыл бұрын
@@PaulTurnerChannel Thank you for quick reply.This is perfect explanation.That means SHA doesn’t provide authenticity right?
@LOL-qr9dy
@LOL-qr9dy Жыл бұрын
yes, that is a really good explaination
@PaulTurnerChannel
@PaulTurnerChannel Жыл бұрын
I’m glad you liked it, LOL (love the screen name). Thanks for taking the time to comment.