\( \def\ZZ{\mathbb{Z}} \def\GG{\mathbb{G}} \def\HH{\mathbb{H}} \)
Here, info can contain other administrative information such as expiration time, restrictions, etc. This can be viewed as as a directed edge in a graph:

If you know A's public key and trust its certification, you can learn B's public key.
Fig 1. Abstract view of a certificate issued by A for B

Check out the following figure (from https://public.cyber.mil/pki-pke/interoperability/).

$ cat choi.cer
-----BEGIN CERTIFICATE-----
MIIEfjCCA2agAwIBAgIDQGAgMA0GCSqGSIb3DQEBBQUAMFcxCzAJBgNVBAYTAlVT
... (omitted) ...
UweOPpb8IbJu+MDGwuV3yxwtQjV9OMHQTJfP8anWwRlqillkGrYx0EBOiC/lnONu
xy6Q/KwF0nUStwvKVugFR/ODJ6U29UY8xqW1h+pfy+91tKkvwA4ATeXDNrWPvEno
J0FSlVvverZMIDPdxxiZEgvm7VfSBORmD+mW0nJuGHskq75WYiLNQUrAFeBBU7Cf
Cbs=
-----END CERTIFICATE-----
As you see above, it's a base64 encoded binary data. In Windows, you can click
the file to check the details. You can also use openssl commands to see the
details.
$ openssl x509 -in choi.cer -text -noout
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 4218912 (0x406020)
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=US, O=U.S. Government, OU=DoD, OU=PKI,
CN=DOD CA-30
Validity
Not Before: Aug 8 00:00:00 2013 GMT
Not After : Aug 7 23:59:59 2016 GMT
Subject: C=US, O=U.S. Government, OU=DoD, OU=PKI,
OU=USN, CN=CHOI.SEUNG GEOL....
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:b8:9e:98:ae:bc:0b:f0:0c:f4:d1:22:17:bc:71:
28:a7:e7:ab:3b:89:37:d9:94:30:8b:ae:78:50:e7:
f9:30:09:ed:91:68:88:f5:e3:37:3a:69:af:d4:89:
...(omitted)...
7c:b3:79:8e:58:da:f9:64:58:c3:ad:90:5f:95:7a:
3c:79:82:31:54:6d:d7:87:68:61:8a:97:41:e2:58:
3c:77:37:0c:ac:e0:ce:41:f9:40:c5:01:c5:b6:26:
d4:4c:79:43:4f:eb:c2:e1:05:5c:65:ed:45:54:b0:
a5:96:a9:28:d2:36:87:a7:f0:b0:e2:02:96:b6:76:
0b:65:b0:60:15:ce:ad:a2:2f:99:aa:ea:cb:b5:3d:
0d:21:e4:fa:1c:df:45:75:a8:f4:0d:b3:ac:7a:82:
f2:63
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Authority Key Identifier:
keyid:08:4E:D5:A4:...(omitted)...06:7C:0D:A3
X509v3 CRL Distribution Points:
Full Name:
URI:http://crl.disa.mil/crl/DODCA_30.crl
X509v3 Key Usage: critical
Digital Signature, Non Repudiation
X509v3 Certificate Policies:
Policy: 2.16.840.1.101.2.1.11.9
Policy: 2.16.840.1.101.2.1.11.19
X509v3 Subject Key Identifier:
05:50:7E:FE:FF:4A:4D:...(omitted)...70:86:B9:FD:8A
Authority Information Access:
CA Issuers - URI:http://crl.disa.mil/sign/DODCA_30.cer
OCSP - URI:http://ocsp.disa.mil
X509v3 Subject Directory Attributes:
0.0...+.......1...US
Signature Algorithm: sha1WithRSAEncryption
8f:91:a9:03:5c:29:75:83:c6:2c:c1:2a:0e:25:61:32:3a:5d:
e8:f7:cd:6f:94:4f:7b:25:02:d9:98:71:db:70:12:3d:7b:f1:
86:7d:71:c4:06:14:c2:a0:41:01:4c:9d:3a:86:0e:43:87:79:
...(omitted)...
72:6e:18:7b:24:ab:be:56:62:22:cd:41:4a:c0:15:e0:41:53:
b0:9f:09:bb
|
1. DataHere, version is the version of X.509 standard, and the serial number is the number that the CA assigns this certificate among many certificates it signed.Signature algorithmDr. Choi's signature algorithm is Hashed RSA that we learned, where hash is SHA-1. It's an old certificate using SHA-1 which is not secure any more.IssuerIssuer contains the information of the certificate authority who issued this certificate. Here, C stands for country, O stands for organization, and OU stands for organizational unit, and CN stands for common name. Usually, what's most important is CN.ValidityThe certificate has expired.SubjectSubject contains the information of the party that owns the certified public key. In this case, it's Dr. Choi.Subject Public Key InfoThis shows the subject's public key, that is, Dr Choi's public key. The algorithm is based on RSA, and the public key consists of two numbers \( (N, e) \), where Modulus corresponds to \( N \), and Exponent corresponds to \( e \).X509v3 extensionX509 version 3 allows extended pieces of information to be contained in the certificates.
|
Certificates can become invalid in one of two ways.
In X.509 certificates, we saw the following:
X509v3 CRL Distribution Points:
Full Name:
URI:http://crl.disa.mil/crl/DODCA_30.crl
Visiting the above URL gives us the CRL list.
The file can be parsed as follows:
> openssl crl -in DODCA_30.crl -inform DER -text -nooutThe result can be seen here.
Equally clearly, rejecting all presented certificates under those circumstances is very unlikely to be correct. Today, systems that use revocation lists typically ignore these denial-of-service risks and hope for the best.
Finding a better approach to deal with revocations is still an on-going battle. See here.
Comodo reported that a user account with an affiliate registration authority had been compromised which was used to create a new user account that issued nine certificate signing requests. Nine certificates for seven domains were issued.
See below the most recent blog article Here's the first a couple of paragraphs:
Intermediate CA keys directly sign server certificates, and we currently recognize nearly 3,000 intermediate certificates, which chain up to approximately 150 root CA certificates embedded as trust anchors in NSS (Network Security Services) and Firefox.
More specifically, we are updating the Mozilla Root Store Policy (MRSP) and associated guidance, improving the public review of third-party intermediate certificates on the Mozilla dev-security-policy list, and enhancing automation in the Common CA Database (CCADB).