Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Millions of Public Certificates Are Reusing Old Private Keys

OWASP Foundation via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
This conference talk reveals how TLS certificates are systematically reusing private keys by the millions, undermining fundamental web security protections. Explore research findings from an analysis of 7 billion certificates logged in Certificate Transparency that uncovered alarming patterns, including organizations like Verizon reusing the same key for 10 years despite revoking it in the first year. Learn about cases where compromised keys continued to be used for new certificate issuance, and discover how even short-lived 90-day certificates often reuse the same private key for a decade. The speakers also share findings from examining 58 million GitHub users' SSH keys, identifying 100,000 SSH keys shared between multiple accounts, and even instances where the same keys were used for both TLS certificates and GitHub SSH authentication. Gain insights into common certificate generation frameworks that perpetuate this risky practice, and access an open-source tool for identifying certificates with reused private keys. This OWASP Foundation presentation delves into the widespread dangers of encryption key reuse and the current security threats it poses.

Syllabus

Millions Of Public Certificates Are Reusing Old Private Keys - Dylan Ayrey, Joseph Leon

Taught by

OWASP Foundation

Reviews

Start your review of Millions of Public Certificates Are Reusing Old Private Keys

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.