Loading content...
In the physical world, we trust passports because governments issue them through rigorous verification processes. We trust notarized documents because notaries are licensed, bonded, and legally accountable. The digital world has its own equivalent: Certificate Authorities (CAs)—the gatekeepers that verify identities and issue the digital certificates enabling secure communications.
A Certificate Authority is an entity trusted to issue digital certificates that bind public keys to identities. When you connect to your bank's website and see the padlock indicating a secure connection, you're implicitly trusting that some CA properly verified the bank's identity before issuing their certificate.
But what makes a CA trustworthy? How do they verify identity? What happens when they fail? Understanding CAs is crucial for any security professional, because the entire web PKI (Public Key Infrastructure) rests on the assumption that CAs do their job correctly. History has shown, repeatedly, that this assumption requires constant vigilance.
By the end of this page, you will understand how Certificate Authorities operate: their verification procedures, security requirements, the distinction between root and intermediate CAs, the process of becoming a trusted CA, and the consequences when CAs fail their trust obligations.
A Certificate Authority is an organization that performs three essential functions:
At its core, a CA operates as a trusted third party. When your browser trusts a website's certificate, it's really trusting the CA's assertion that the certificate holder legitimately controls that domain.
The Technical Mechanics:
When a CA issues a certificate, it:
The CA's signature is the crucial element. Anyone can verify this signature using the CA's public key (contained in the CA's own certificate). If the signature is valid, the certificate is authentic—it was genuinely issued by that CA.
12345678910111213141516171819202122232425
# Generate a private keyopenssl genrsa -out mydomain.key 2048 # Create a Certificate Signing Requestopenssl req -new -key mydomain.key -out mydomain.csr \ -subj "/CN=www.mydomain.com/O=My Organization/L=San Francisco/ST=California/C=US" # View the CSR contentsopenssl req -in mydomain.csr -text -noout # CSR structure:Certificate Request: Data: Version: 1 (0x0) Subject: CN = www.mydomain.com, O = My Organization, L = San Francisco, ST = California, C = US Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public-Key: (2048 bit) Modulus: 00:b4:5f:c3:a2:... (256 bytes) Exponent: 65537 (0x10001) Attributes: a] Requested extensions are often included here Signature Algorithm: sha256WithRSAEncryption [Signature proving possession of private key]The CSR is signed with the applicant's private key. This proves the applicant possesses the corresponding private key—an essential security property. The CA never sees the private key; it only receives the public key and proof that the applicant can sign with the private key.
CAs exist in a hierarchical structure. Understanding this hierarchy is essential for comprehending how trust flows through the PKI system.
Root CAs:
A Root CA is the ultimate trust anchor. Its certificate is self-signed—the issuer and subject are the same entity. Root CA certificates are directly embedded in operating systems: and browsers (the "root store"). These certificates are implicitly trusted; no signature verification is possible because there's no higher authority.
Root CAs are extraordinarily security-sensitive. A compromised root CA can issue certificates for any domain, enabling undetectable MITM attacks against any website. Therefore, root CA private keys are protected with extreme measures:
Intermediate CAs (Subordinate CAs):
To reduce risk, root CAs rarely sign end-entity certificates directly. Instead, they sign certificates for Intermediate CAs, which then sign end-entity certificates. This creates a chain:
Root CA → Intermediate CA → End-Entity Certificate
Benefits of this architecture:
| Characteristic | Root CA | Intermediate CA |
|---|---|---|
| Certificate Type | Self-signed | Signed by root or higher intermediate |
| Trust Source | Embedded in root stores | Derives trust from parent CA |
| Private Key Storage | HSM, offline, air-gapped | HSM, may be online for automation |
| Signing Frequency | Rare (years between signings) | Frequent (issues end-entity certs) |
| Compromise Impact | Catastrophic (affects all certs) | Serious but contained (revocable) |
| Validity Period | 20-30 years typical | 5-10 years typical |
| Revocation | Extremely difficult (root store updates) | Standard CRL/OCSP mechanisms |
Registration Authorities (RAs):
Some CAs delegate identity verification to Registration Authorities. An RA performs the verification process but doesn't have signing keys—it submits approved requests to the CA for signing. This separation allows:
Private/Enterprise CAs:
Organizations can run their own CAs for internal use. These are not trusted by the public internet but are deployed to corporate devices through enterprise management:
A significant tension exists: for a CA to be useful, its root must be widely distributed. But updating root stores requires operating system or browser updates—a slow process. This means adding new CAs takes years, and removing compromised CAs is an emergency operation that may leave users unable to access sites.
The value of a certificate depends entirely on the rigor of the CA's verification. Different validation levels require different procedures.
Domain Validation (DV):
DV is the simplest and most automated validation. The CA verifies only that the applicant controls the domain—not who they are. Methods include:
123456789101112131415161718192021
# ACME HTTP-01 Challenge Example (Let's Encrypt) # 1. CA provides a token and expected key authorizationToken: abc123def456Key Authorization: abc123def456.thumbprint-of-account-key # 2. Applicant places file at:http://www.mydomain.com/.well-known/acme-challenge/abc123def456 # File contents:abc123def456.thumb<print-of-account-key # 3. CA makes HTTP request to verifyGET /.well-known/acme-challenge/abc123def456 HTTP/1.1Host: www.mydomain.com # 4. If response matches, domain control is proven # DNS-01 Challenge Example# CA provides token, applicant creates DNS record:_acme-challenge.www.mydomain.com. TXT "dGVzdC12YWx1ZS1mb3ItZG5zLXByb29m"Organization Validation (OV):
OV adds verification that the organization exists and is entitled to use the domain:
Extended Validation (EV):
EV is the most rigorous validation, requiring:
EV certificates typically take 1-5 business days to issue due to manual verification steps.
The CA/Browser Forum publishes 'Baseline Requirements' that all publicly trusted CAs must follow. These specify minimum validation procedures, certificate contents, validity periods, and key sizes. CAs are audited against these requirements to maintain root store inclusion.
CAs must maintain extraordinarily high security standards. A CA compromise would undermine trust in the entire PKI. The industry has developed comprehensive requirements that CAs must meet.
Physical Security:
Root CA keys are protected with military-grade physical security:
Ceremony Procedures:
Root CA private keys are used in formal "key ceremonies" with strict procedures:
Auditing Requirements:
Publicly trusted CAs must undergo regular audits to maintain root store inclusion:
WebTrust for CAs:
ETSI Standards:
Key Management Requirements:
| Requirement | Root CA | Intermediate CA | Rationale |
|---|---|---|---|
| Key Storage | HSM, FIPS 140-2 Level 3+ | HSM, FIPS 140-2 Level 2+ | Hardware protection prevents key extraction |
| Network Connectivity | Air-gapped (offline) | Can be online for automation | Reduces attack surface for most critical keys |
| Backup Key Storage | Multiple HSM copies in secure locations | HSM with geographic redundancy | Ensure key availability while maintaining security |
| Key Recovery | M-of-N key shareholders | Documented recovery procedures | Prevent single-point-of-failure while requiring multiple parties |
| Key Destruction | Documented, witnessed destruction | Secure deletion procedures | Ensure keys cannot be recovered after end-of-life |
Running a publicly trusted CA is expensive. HSMs cost tens of thousands of dollars. Audits cost hundreds of thousands annually. Secure facilities, trained staff, and insurance add to costs. This is why there are relatively few publicly trusted CAs, and why certificate prices historically reflected these costs (before Let's Encrypt changed the economics).
A handful of organizations dominate the public CA market. Understanding who they are and their market positions provides context for the PKI ecosystem.
Market Leaders:
| CA / Parent Company | Market Position | Notable Characteristics |
|---|---|---|
| DigiCert (includes Symantec, GeoTrust, Thawte) | Largest commercial CA | Enterprise focus, high-assurance certificates, acquired several legacy CAs |
| Let's Encrypt (ISRG) | Largest by volume | Free, automated, 90-day certificates, revolutionized DV issuance |
| Sectigo (formerly Comodo CA) | Major commercial CA | Wide product range, competitive pricing, strong in SMB market |
| GlobalSign | Enterprise CA | PKI solutions, IoT certificates, owned by GMO Internet |
| GoDaddy | Volume commercial CA | Bundled with hosting services, consumer-focused |
| Entrust | Government and enterprise | Strong in regulated industries, smart card / PKI solutions |
| IdenTrust | Specialized CA | Powers Let's Encrypt cross-sign, federal PKI bridge |
Let's Encrypt: The Revolution:
Let's Encrypt, launched in 2016, fundamentally changed the CA landscape:
Before Let's Encrypt:
After Let's Encrypt:
Today, Let's Encrypt issues over 3 million certificates daily and secures a majority of the web's encrypted connections. Their success proved that the barrier to HTTPS was primarily cost and complexity, not technical capability.
Government CAs:
Many governments operate their own CAs for internal use:
Government CAs are typically not in public root stores but are distributed through government-controlled systems.
The CA market has consolidated significantly through acquisitions. DigiCert acquired Symantec's CA business, Thawte, and GeoTrust. This concentration creates systemic risk—a problem at a major CA affects a large portion of the web. It also raises concerns about pricing power and innovation.
Becoming a publicly trusted CA is a multi-year, multi-million dollar endeavor. The process is deliberately arduous to ensure only well-resourced, committed organizations can issue publicly trusted certificates.
The Path to Trust:
Root Program Requirements:
Each major root program has its own requirements:
Mozilla Root Store Policy:
Microsoft Root Certificate Program:
Apple Root Certificate Program:
Google Chrome Root Program:
Timeline:
The entire process typically takes 3-5 years from decision to inclusion:
New CAs often accelerate trust by getting their root cross-signed by an existing trusted CA. This provides immediate trust while their own root propagates through root stores. Let's Encrypt's ISRG Root was cross-signed by IdenTrust's DST Root CA X3 for exactly this reason.
CA failures demonstrate why the trust model requires vigilance. Historical incidents have shaped current requirements and have led to CA removals from root stores.
DigiNotar (2011) — Complete CA Compromise:
In 2011, attackers completely compromised DigiNotar's CA infrastructure, issuing over 500 fraudulent certificates including one for *.google.com. The fake Google certificate was used to intercept Iranian users' Gmail traffic. DigiNotar was removed from all root stores within weeks and the company declared bankruptcy shortly after. This single incident led to massive improvements in CA security requirements.
What Went Wrong at DigiNotar:
Symantec (2015-2017) — Systematic Mis-issuance:
Symantec, then the world's largest CA, was found to have:
Google Chrome progressively distrusted Symantec certificates, forcing a sale to DigiCert and complete reissuance of all certificates—affecting millions of websites.
WoSign/StartCom (2016) — Backdating and Deception:
Mozilla completely removed WoSign and StartCom from their trust store—a death sentence for a public CA.
Lessons Learned:
These incidents drove major improvements:
Certificate Authorities are the trust anchors of internet security. Let's consolidate the essential knowledge:
What's Next:
We've seen how individual CAs operate. But how does trust flow when certificates are signed by intermediates that are signed by roots? The next page explores the Chain of Trust—the mechanism by which your browser verifies an arbitrary certificate by tracing it back to a trusted root.
You now understand Certificate Authorities in depth: their verification procedures, security requirements, the major players, and the consequences of failure. This knowledge is essential for understanding why we trust certificates and what risks exist in the current PKI model. Next, we explore how Chain of Trust verification works.