Questions about Certificate Transparency

What is Certificate Transparency? Certificate Transparency (CT) is a system which uses public logs to record all certificates issued by a Certificate Authority (CA). Browsers, CAs and other parties can use CT (alongside other existing techniques) to confirm a certificate was correctly issued and thus » Continue Reading.

Does the Basic SSL Certificate work with subdomains?

Yes, SSL.com’s Basic SSL certificate does work with subdomains.  You may select one Fully Qualified Domain Name (FQDN) to protect with your Basic SSL certificate.  This FQDN may be either a root domain (for example, yourdomain.com) or a subdomain (i.e., support.yourdomain.com). Whichever you choose, we’ll » Continue Reading.

What Is a CSR?

A certificate signing request (CSR) is an encoded message that contains a public key and other relevant information such as your common name, locality and SAN entries (if applicable). Once all of the desired information has been entered during the CSR generation process, the request is digitally » Continue Reading.

What is a “man in the middle” attack?

In a man in the middle (or MITM) attack, communication between two endpoints is compromised by a third party – the ‘man in the middle’. In a passive MITM attack attackers ‘tap’ the communication, capturing information in transit without changing it. If attackers attempt to to modify or tamper with the » Continue Reading.

What Is A Cryptographic Hash Function?

A cryptographic hash function converts arbitrarily long input data into a predetermined fixed-length output value. Hash functions generally include padding as well as termination schemes that work in union with the function itself to provide greater security to the output value. The most commonly used cryptographic » Continue Reading.