Self-signed certificate explained

In cryptography and computer security, self-signed certificates are public key certificates that are not issued by a certificate authority (CA). These self-signed certificates are easy to make and do not cost money. However, they do not provide any trust value.

For instance, if a website owner uses a self-signed certificate to provide HTTPS services, people who visit that website cannot be certain that they are connected to their intended destination. For all they know, a malicious third-party could be redirecting the connection using another self-signed certificate bearing the same holder name. The connection is still encrypted, but does not necessarily lead to its intended target. In comparison, a certificate signed by a trusted CA prevents this attack because the user's web browser separately validates the certificate against the issuing CA. The attacker's certificate fails this validation.

Benefits

Self-signed certificates can be created for free, using a wide variety of tools including OpenSSL, Java's keytool, Adobe Reader, wolfSSL and Apple's Keychain. They are easy to customize; e.g, they can have larger key sizes or hold additional metadata. Their use doesn't involve the problems of trusting third parties that may improperly sign certificates. Self-signed certificate transactions usually present a far smaller attack surface by eliminating both the complex certificate chain validation, and certificate revocation checks like CRL and OCSP.

Trust issues

In a CA-based PKI system, parties engaged in secure communication must trust a CA, i.e. place the CA certificates in a whitelist of trusted certificates. Developers of web browsers may use procedures specified by the CA/Browser Forum to whitelist well-known, public certificate authorities. Individual groups and companies may whitelist additional, private CA certificates. The trust issues of an entity accepting a new self-signed certificate are similar to the issues of an entity trusting the addition of a new CA certificate. The parties in a self-signed PKI must establish trust with each other (using procedures outside the PKI), and confirm the accurate transfer of public keys e.g. compare the certificate's cryptographic hash out of band.

There are many subtle differences between CA signed and self-signed certificates, especially in the amount of trust that can be placed in the security assertions of the certificate. Some CAs can verify the identity of the person to whom they issue a certificate; for example the US military issues their Common Access Cards in person, with multiple forms of other ID. The CA can attest identity values like these by including them in the signed certificate. The entity that validates the certificate can trust the information in that certificate, to the same extent that they trust the CA that signed it (and by implication, the security procedures the CA used to verify the attested information).

With a self-signed certificate by contrast, trust of the values in the certificate are more complicated because the entity possesses the signing key, and can always generate a new certificate with different values. For example, the validity dates of a self-signed certificate might not be trusted because the entity could always create and sign a new certificate that contained a valid date range.

The values in a self-signed certificate can only be trusted when the values were verified out-of-band during the acceptance of the certificate, and there is a method to verify the self-signed certificate has not changed after it was trusted. For example, the procedure of trusting a self-signed certificate includes a manual verification of validity dates, and a hash of the certificate is incorporated into the white list.[1] When the certificate is presented for an entity to validate, they first verify the hash of the certificate matches the reference hash in the white-list, and if they match (indicating the self-signed certificate is the same as the one that was formerly trusted) then the certificate's validity dates can be trusted. Special treatment of X.509 certificate fields for self-signed certificate can be found in RFC 3280.[2]

Revocation of self-signed certificates differs from CA-signed certificates. By nature, no entity (CA or others) can revoke a self-signed certificate. But one could invalidate a self-signed CA by removing it from the trust whitelist.[3]

Uses

Self-signed certificates have limited uses, e.g. in the cases where the issuer and the sole user are the same entity. For example, the Encrypting File System on Microsoft Windows issues a self-signed certificate on behalf of a user account to transparently encrypt and decrypt files on the fly. Another example is a root certificate, which is a form of self-signed certificate.

Name Confusion

The terms "self-signed" and "self-issued" are occasionally used interchangeably and "self-signed certificate" is sometimes even incorrectly used to indicate a certificate issued by a private (not publicly trusted) CA.[4] [5] [6]

RFC 5280 defines self-signed certificates as "self-issued certificates where the digital signature may be verified by the public key bound into the certificate" [7] whereas a self-issued certificate is a certificate "in which the issuer and subject are the same entity". While in the strict sense the RFC makes this definition only for CA certificates, there is no reason to also adopt that definition for end-entity certificates.

See also

Notes and References

  1. Web site: How to bypass SSLHandshakeException. en. 2021-08-01. 2021-08-01. http://web.archive.org/web/20210801154451/https://ananich.pro/2020/06/how-to-bypass-javax-net-ssl-sslhandshakeexception/. live.
  2. Certificate and CRL Profile – RFC 3280. tools.ietf.org. May 2002. en. 2017-04-06. Housley. Russ. Polk. Tim. Ford. Warwick S.. Solo. David. 2017-04-26. http://web.archive.org/web/20170426221401/https://tools.ietf.org/html/rfc3280. live.
  3. Web site: RFC 2459: Internet X.509 Public Key Infrastructure Certificate and CRL Profile . January 1999 . www.ietf.org . 2009-01-03 . 2012-12-14 . https://web.archive.org/web/20121214113250/http://www.ietf.org/rfc/rfc2459.txt . live .
  4. Web site: How to Create Trusted Self-Signed SSL Certificates and Local Domains for Testing . 2024-02-15 . "A self-signed certificate is a certificate that’s signed by the person creating it".
  5. Web site: Generate an Azure Application Gateway self-signed certificate with a custom root CA . 2024-02-15.
  6. Web site: Creating a browser trusted, self signed, SSL certificate by Thijs Busser Medium . 2024-02-15 . "a self signed SSL certificate to use for website development needs a root certificate".
  7. https://datatracker.ietf.org/doc/html/rfc5280#section-3.2
  8. Web site: Public Beta. 2015-12-06. Let's encrypt. 2018-04-07. https://web.archive.org/web/20180407195510/https://letsencrypt.org/2015/11/12/public-beta-timing.html. live.