1 \section{Public Key Infrastructures}
4 Public-Key Infrastructures aim to provide a way to simplify the verification of
5 a certificate's trustworthiness. For this, certificate authorities (CAs) are
6 used for creating a signature chain from the CA down to the server (or client).
7 Accepting a CA as a generally-trusted mediator solves the trust-scaling problem
8 at the cost of introducing an actor that magically is more trustworthy.
10 This section deals with settings related to trusting CAs. However, our main
11 recommendations for PKIs is: if you are able to run your own PKI and disable
12 any other CA, do so. This is mostly possible in any machine 2 machine
13 communication system where compatibility with externalities is not an issue.
15 A good background on PKIs can be found in \todo{insert reference}.
17 \todo{ts: Background and Configuration (EMET) of Certificate Pinning, TLSA integration,
18 When to use self-signed certificates, how to get certificates from public CA authorities
19 (CACert, StartSSL), Best-practices how to create a CA and how to generate private keys/CSRs,
20 Discussion about OCSP and CRLs. TD: Useful Firefox plugins: CipherFox, Conspiracy, Perspectives.}
24 %Policy''\footnote{\url{http://en.wikipedia.org/wiki/Certificate_Policy}}