Kubernetes TLS Certificates Basic
Contents
Symmetric Encryption
Plain Text Transport
Data
| |
Plain Text
This is very weak for security.
There’s no encryption.
It’s easy to hijack the
There’s no encryption.
It’s easy to hijack the
data.Encryption Transport
Data
| |
Key
| |
Encrypted Data
| |
Symmetric Encryption
This is encrypted, but it’s still weak for security.
It’s still easy to hijack
So they can decrypt the
It’s still easy to hijack
data including the key.So they can decrypt the
data with key.Asymmetric Encryption
Mechanism
Theory
Split the
So it’s an easy way to remember
key to Public Key and Private Key.Public Key is used to encrypt, Private Key is used to decrypt.So it’s an easy way to remember
Public Key as Public Lock.SSH
Generate Client User’s Private Key and Public Key
| |
Register User’s id_rsa.pub to the Server
| |
Public Key List
| |
Connect to the Server
| |
Process Summary
Personal Asymmetric Encryption in Web
Personal Problem
It can be hijacked by DNS spoofing and copy the website that has their RSA.
Generate RSA
Private Key
| |
Public Key
| |
Process
CA(Certificate Authority)
Certificate Authority
When you use personal RSA asymmetric encryption, there’s security problems that I talked above.
For security, you need to use certificate authority services.
For security, you need to use certificate authority services.
CSR
Certificate Signing Request
Browser and CA
All browsers are built in certificate validation mechanism.
The browsers have public keys of well known certificate authority organizations.
The browsers have public keys of well known certificate authority organizations.
| |
private.csr
| |
Process
PKI(Public Key Infrastructure)
PKI
Above whole structure is called PKI.
| Certificate(Public Key) | Private Key | |
|---|---|---|
| Purpose | Encrypt(Lock) | Decrypt |
| Extension Type | *.crt | *.key |
| *.pem | *-key.pem | |
| Examples | server.crt | server.key |
| server.pem | server-key.pem | |
| client.crt | client.key | |
| client.pem | client-key.pem |
CozyFex