SlideShare a Scribd company logo
1 of 33
SSL:
What it is, How to do it, &
Why you should care
WordCamp Chicago 2017
Hello!
A bit about me…
@jessicacgardner
1.
SSL: What it is
HTTP Review
HTTPS
The 3 main things
◎Authentication and Verification
◎Privacy/Data Encryption
◎Data Integrity
Jargon & Acronyms
◎SSL – Secure Socket Layer
◎TLS – Transport Layer Security
◎HTTPS – Hypertext Transfer Protocol Secure
◎PKI – Public Key Infrastructure
◎CA – Certificate Authority
◎CSR – Certificate Signing Request
Image: https://thenocman.com/ssl-certificates/
Image: https://www.codeproject.com/Articles/326574/An-Introduction-to-Mutual-SSL-Authentication
2.
Why you should care
Who Needs It?
◎E-Commerce– PCI Compliance
◎Entertainment- DRM
◎Market Research
◎Productivity
◎Social Media
◎Education/Testing
◎Sensitive Form Data
3.
How to do it
You’ll Need…
Certificate contents
◎Domain name (common name)
◎Public key
◎Owner of certificate (subject)
◎Issuer of certificate (CA)
◎Expiration data
◎Serial number
Types of Certificates
◎Domain Validation – CA checks right of
applicant to use domain name
◎Organization Validation – CA does above +
vets organization
◎Extended Validation – CA does above +
thorough vetting of organization
Self-Signed vs Trusted CA
◎Self-Signed: generally used for testing.
Offers encryption but not validation. Will give
errors.
Trusted Certificate Authorities
◎Client (browser) checks certificate validity
◎OCSP request (Online Certificate Status
Protocol)
◎CRL – Certificate Revocation List
○If revoked, client returns error
○If clear, communications proceed
Let’s Encrypt (Yes, Let’s!)
◎Free, automated, open certificate
◎Non-profit Internet Security Research Group
◎Domain validation
◎No warranty
◎3-month expiry
◎Update Site URL from http:// to https://
◎Force http requests to https
Issues and Caveats
◎Moving a site
◎Cloud Proxy
◎Mixed/Unsecure content
Removing SSL
◎wp-config.php
◎.htaccess
◎Updating site URL (functions.php)
Thanks!
Any questions?
You can find me at:
@jessicacgardner
jessica@btwrx.com
Resources
◎SSL Server Test:
https://www.ssllabs.com/ssltest/
◎Why No Padlock?
https://www.whynopadlock.com/
◎CryptoReport
https://cryptoreport.websecurity.symantec.com/
checker/

More Related Content

What's hot

Sw2 prezen3pdf
Sw2 prezen3pdfSw2 prezen3pdf
Sw2 prezen3pdf
s1190088
 
Sw prezen3pdf
Sw prezen3pdfSw prezen3pdf
Sw prezen3pdf
s1190088
 
Block Chain meets Big Data
Block Chain meets Big DataBlock Chain meets Big Data
Block Chain meets Big Data
Vihang Patel
 

What's hot (20)

OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
 
20180426 legal challenges related to blockchain technology
20180426 legal challenges related to blockchain technology20180426 legal challenges related to blockchain technology
20180426 legal challenges related to blockchain technology
 
Modern Authentication for ASP.NET Core with IdentityServer 4 (Progressive .NE...
Modern Authentication for ASP.NET Core with IdentityServer 4 (Progressive .NE...Modern Authentication for ASP.NET Core with IdentityServer 4 (Progressive .NE...
Modern Authentication for ASP.NET Core with IdentityServer 4 (Progressive .NE...
 
Uncovering DeFi Largest Hacks - Key Factors to Consider & How to Mitigate Risks
Uncovering DeFi Largest Hacks - Key Factors to Consider & How to Mitigate Risks Uncovering DeFi Largest Hacks - Key Factors to Consider & How to Mitigate Risks
Uncovering DeFi Largest Hacks - Key Factors to Consider & How to Mitigate Risks
 
BOTCHAIN aka The Dark side of Blockchain
BOTCHAIN aka The Dark side of BlockchainBOTCHAIN aka The Dark side of Blockchain
BOTCHAIN aka The Dark side of Blockchain
 
Sw2 prezen3pdf
Sw2 prezen3pdfSw2 prezen3pdf
Sw2 prezen3pdf
 
Sw prezen3pdf
Sw prezen3pdfSw prezen3pdf
Sw prezen3pdf
 
Authorization Using JWTs
Authorization Using JWTsAuthorization Using JWTs
Authorization Using JWTs
 
How you can support Bitcoin today | ProvenCrypto
How you can support Bitcoin today | ProvenCryptoHow you can support Bitcoin today | ProvenCrypto
How you can support Bitcoin today | ProvenCrypto
 
Block Chain meets Big Data
Block Chain meets Big DataBlock Chain meets Big Data
Block Chain meets Big Data
 
Practical Cryptography
Practical CryptographyPractical Cryptography
Practical Cryptography
 
Particl Project - Privacy Focused Decentralized Applications
Particl Project - Privacy Focused Decentralized ApplicationsParticl Project - Privacy Focused Decentralized Applications
Particl Project - Privacy Focused Decentralized Applications
 
BrodTech 2021: Blockchain | Mak Muftić (ChainSafe)
BrodTech 2021: Blockchain | Mak Muftić (ChainSafe)BrodTech 2021: Blockchain | Mak Muftić (ChainSafe)
BrodTech 2021: Blockchain | Mak Muftić (ChainSafe)
 
Blockchain presentation for Devfest 2018
Blockchain presentation for Devfest 2018 Blockchain presentation for Devfest 2018
Blockchain presentation for Devfest 2018
 
Corporate Web Systems
Corporate Web SystemsCorporate Web Systems
Corporate Web Systems
 
Bit trade labs sovereign identity fintech summit 2016
Bit trade labs sovereign identity   fintech summit 2016Bit trade labs sovereign identity   fintech summit 2016
Bit trade labs sovereign identity fintech summit 2016
 
Blockchain Introduction
Blockchain IntroductionBlockchain Introduction
Blockchain Introduction
 
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJSSupply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
 
What is Cryptocurrency Mining?
What is Cryptocurrency Mining?What is Cryptocurrency Mining?
What is Cryptocurrency Mining?
 
Introduction to Distributed Ledger Technology or Blockchain
Introduction to Distributed Ledger Technology or BlockchainIntroduction to Distributed Ledger Technology or Blockchain
Introduction to Distributed Ledger Technology or Blockchain
 

Similar to SSL: What is it, How to do it, and Why you should care

Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoorsCarrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoors
Iaetsd Iaetsd
 
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGCPKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
Nizar Ben Neji
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson
 

Similar to SSL: What is it, How to do it, and Why you should care (20)

Lecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security BreachLecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
 
Lecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLSLecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLS
 
Cryptography
CryptographyCryptography
Cryptography
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
Certificates and Web of Trust
Certificates and Web of TrustCertificates and Web of Trust
Certificates and Web of Trust
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Symantec SSL Explained
Symantec SSL ExplainedSymantec SSL Explained
Symantec SSL Explained
 
Data Security Whitepaper
Data Security WhitepaperData Security Whitepaper
Data Security Whitepaper
 
ExpressionEngine Conference: Rock Solid - Securing You Client's ExpressionEng...
ExpressionEngine Conference: Rock Solid - Securing You Client's ExpressionEng...ExpressionEngine Conference: Rock Solid - Securing You Client's ExpressionEng...
ExpressionEngine Conference: Rock Solid - Securing You Client's ExpressionEng...
 
CRYPTOCURRENCY: TRADING MARKET
CRYPTOCURRENCY: TRADING MARKETCRYPTOCURRENCY: TRADING MARKET
CRYPTOCURRENCY: TRADING MARKET
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacy
 
Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoorsCarrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoors
 
2
22
2
 
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL Certificate
 
IS-Crypttools.pptx
IS-Crypttools.pptxIS-Crypttools.pptx
IS-Crypttools.pptx
 
Introduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & SecureIntroduction to SSL and How to Exploit & Secure
Introduction to SSL and How to Exploit & Secure
 
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGCPKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
PKI_in_Depth__TATT__Niza_Ben_Neji__TMGC
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

SSL: What is it, How to do it, and Why you should care