class28 on your Desktop.
All files downloaded and created for this lab MUST be in this directory!
cd command to change directory to your
class28 directory.openssl extensively.
You should have already installed openssl when you
installed the SI110 Course Software. The following command will ensure that Windows
will find the openssl program (assuming you installed it!).
Copy the below command, paste it into your command window, and execute it.
set path=%path%;C:\OpenSSL-Win32\bin
hostname in your command-prompt window.<html> <body> <h1>Welcome to </h1> Trust me, I really am who I say I am! </body> </html>Name the file
index.html, and save it in your class28 directory.
Open the file in Firefox and verify that it looks like it should. (And you should be able to tell what it ought to look like!)
https://www.navyfederal.org.
The certificate certifies that the identity
www.navyfederal.org is associated with a particular public key.
Why? So that when you send data to navyfederal.org that has been encrypted with that public key,
you know the actual entity "www.navyfederal.org" is the only one who can decrypt the data.
But what makes you trust the certificate?
The idea is that there are Certificate Authorities, entities that vouch for the validity of certificates by signing them. When your browser was installed, it came with a list of Certificate Authorities that it (and thus you) already trust -- but you can add or remove authorities. You might be surprised at who you are currently trusting. Let's look!In January 2013, it was discovered that the authority Certificate Authority TURKTRUST had accidently issued a certificate to a customer that stated that the certificate was valid for issuing new certificates — it should only have been valid for HTTPS sessions. This certificate was then used to issue fradulent certificates for google domain names, which allowed the bad guys to carry out man-in-the-middle attacks. The blog krebsonsecurity.com has the story: Turkish Registrar Enabled Phishers to Spoof Google.
Right click the following link, select Save Link As ...,
navigate to your class28 directory, and save the
certificate there: unknown certificate
Examine the certificate by entering the following command in your command window:
openssl x509 -text -in ra37891_cert.pem
To see what happens when you send your browser to a site with a fishy certificate like this, pull up:
https://rona.cs.usna.eduWhat happened? Check out the "Technical Details".
N/A), and
you will create a certificate, which will be signed by the
SI110 Certificate Authority, will certify that the name
matches your public key (which you will generate for
yourself).
N/A

pubpri.key file:N/AUse the
dir command in your command-prompt window and verify that you
have just created a file named pubpri.key
is associated with the
public key you've just created. You will later submit this
request to the SI110 Certificate Authority.
Fill in all fields for the
request except for "common name"
with lies (i.e. make stuff up). The "common name" field must
be your computer's full domain name.
← READ THIS
N/AUse the
dir command in your command-prompt window and verify that you
have just created a file
named .csr and
that it's size is not 0.
.csr from
your class28 directory, then press the Sign This File button.
Follow the directions on that page, then return to this page, then
use the dir command in your command-prompt window and verify that you
have just created a file named .crt
index.html
page in a secure and authenticated manner!N/A
ENTER PARTNER'S HOSTNAME ABOVE TO GET URL
← you must put "/index.html" on
the end!
ca.crt,
the SI110 Certificate Authority certificate, to
your class28 directory.ca.crt from your class28
directory. (Check the "Trust websites" box.)
ENTER PARTNER'S HOSTNAME ABOVE TO GET URL.
Let's simulate that, and see what happens.
hosts!)
notepad \Windows\System32\drivers\etc\hosts
ENTER BAD GUY IP ABOVE TO GET LINE FOR ETC\HOSTS FILE... and Save (not Save As), but do not exit Notepad.
What this does is to tell Windows that the domain name
ENTER PARTNER HOSTNAME ABOVE should resolve to
ENTER BAD GUY IP ABOVE.
and not to bother querying a nameserver.
C:\Windows\System32\drivers\etc\hosts file.
You need to use DoD issued personal certificates! To learn about your own digital certificates on your CAC card, perform the following steps.