Avatar of c-h-r-i-s-t-o-p-h
c-h-r-i-s-t-o-p-hFlag for United States of America

asked on 

What are the types of SSL certs?

What are the types of SSL certs and what are their functions / relationships? (i.e. intermediate certs, etc)
SSL / HTTPSEncryptionSecurity

Avatar of undefined
Last Comment
arnold
Avatar of arnold
arnold
Flag of United States of America image

Trusted,  ROOT
intermediate Root Signed and is there by trusted
end user "refelcts" the user/service. But the authenticity is based on the process the signing entity goes through to verify that the person applying for the certificate is who they say they are and represent what they say they represent.

I.e a person presenting a State issued document is presumed to be who they say they are given it is a State issued document.  If a person presents a school ID, the school is somewhat similar to an intermediate i.e. recognized by the State and thereby derives its credibility from the state.  If someone presents a school ID from a school you've never heard of, you will likely be more suspicious of whether the person is who they say they are.

As far as types, there are too many to enumerate, but can easily be found when searched.
Trusted, intermediate, subordinated.
Code, user, Web sites, etc.

The end result is the same to convey that who ever presents is who/what/and come from an entity represented in the certificate.
Avatar of giltjr
giltjr
Flag of United States of America image

I agree with Mod_MarlEE, seems like a homework question.

TLS V1 standard: http://www.ietf.org/rfc/rfc2246.txt

Baed on SSL V3, SSL was developed by NetScape TLS is the RCF'ed public version of SSL.
Avatar of c-h-r-i-s-t-o-p-h

ASKER

Moderator- im troubleshooting an issue. Specifically, what would cause a server to fail to send a server hello in response to a client hello while using SSL but not TLSv1, SSLv2, or SSLv3...

All others- what are the relationships between the different type of certs? Do they interact together or do they serve different purposes?
Avatar of HonorGod
HonorGod
Flag of United States of America image

Q: Do they interact together?
A: No

Q: do they serve different purposes?
A: No

All of the certs are used to identify the client and server in the communication.
It is similar in concept to using a "pass phrase" when a telephone call is made.
The Caller asks a question - the Recipient must respond correctly, then the Recipient asks a question, and the Caller must respond correctly.  That way, each side can have some level of trust that the "person" on the other end of the call is who they say they are...

Q: What's the difference between the different certs?
A: Consider the situation where multiple SSL certificate protocols are supported, each can have it's own certificate.
Avatar of c-h-r-i-s-t-o-p-h

ASKER

HonorGod - If I understand you correctly, then each different SSL cert is responsible for a different protocol.

Therefore, is it safe to assume that if TLSv1.0, SSLv2, and SSLv3 function normally, but the server fails to send a "Server Hello" in response to the client's "Client Hello" via SSL... then the certs responsible for TLSv1.0, SSLv2, and SSLv3 might be installed correctly, while the cert responsible for SSL is not correctly installed?
Avatar of giltjr
giltjr
Flag of United States of America image

Then what is the server?

What is the client?
Avatar of HonorGod
HonorGod
Flag of United States of America image

Q: but the server fails to send a "Server Hello" in response to the client's "Client Hello" via SSL... then the certs responsible for TLSv1.0, SSLv2, and SSLv3 might be installed correctly, while the cert responsible for SSL is not correctly installed?

A: It is really had to say exactly what is occurring without a trace.  Are we talking about an application program (as the client) sending the "Client Hello" message to the server?

As giltjr said, "what is the client"?  Is it an application, or a browser?
And what is the server?  is it a web server, or an application, or an application server behind a web server?

Avatar of giltjr
giltjr
Flag of United States of America image

If this is a trouble shooting issue, then you really should have one question.

Based on one of your responses in one of the other questions, there is not a whole lot you will be able to do.

Since you don't have the private key, you will not be able to run a sniffer program and truly see what is going on.

The server side has the they, they need to run the sniffer and the using the private key they can decode the trace and see what is going on.
Avatar of c-h-r-i-s-t-o-p-h

ASKER

The server is a Citrix Access Gateway 2010. The client is internet explorer and/or firefox running on end user laptops. The issue is reported via internet explorer more often than firefox... this could be an inaccurate observation or browser settings related... more below.

The only consistency that I have found (via packet capture) is that each and every "failed" connection begins with a Client Hello sent over SSL. The server sends an ACK, but fails to send a Server Hello via SSL. 30 seconds pass. The client sends a Client Hello via SSLv2. The server then sends an ACK, followed by a Server Hello via SSLv3. Traffic then passes as normal. To the end user, the initial login page attempts to load for approximately 30 seconds... when the client attempts via SSLv2, the page instantly loads and their experience is normal.

The other scenario (where the user has a normal experience), the connection begins with a Client Hello sent over TLSv1.0. The server sends an ACK, followed by a Server Hello via TLSv1.0.

Communication is breaking down when the client attempts to negotiate via SSL. I am trying to understand why this might happen.

I disabled TLSv1.0 on my browsers and left SSLv3 enabled as an initial test. Thus far, I have not experienced any issues while doing so.


Why would this behavior occur? What can be done to further isolate the issue?
Avatar of c-h-r-i-s-t-o-p-h

ASKER

It is an internal server and I have access to any of the certs that are installed on it.
ASKER CERTIFIED SOLUTION
Avatar of giltjr
giltjr
Flag of United States of America image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
SOLUTION
Avatar of arnold
arnold
Flag of United States of America image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
Security
Security

Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.

32K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo