Skip to content

Commit 29e0bc7

Browse files
committed
use certificate authority vs certification authority
1 parent 5462c53 commit 29e0bc7

File tree

3 files changed

+16
-14
lines changed

3 files changed

+16
-14
lines changed

infra.rst

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -317,7 +317,7 @@ additional layers in this hierarchy. A hierarchy of
317317
certificates can be created to follow this hierarchy of address
318318
allocation. The RIRs form trust anchors from which chains of trust
319319
can be built, much the way a modern browser comes with a set of
320-
trusted root certification authorities (CAs) so that the certificates
320+
trusted root certificate authorities (CAs) so that the certificates
321321
issued by web sites, which are signed by CAs, can be checked for validity.
322322

323323
A key distinction between RPKI and the certificates that we are
@@ -519,7 +519,7 @@ or numbers corresponding to the AS in which the router is located.
519519
As with all public key certificates, we need a chain of trust from a
520520
trusted root to the router certificate. For example, an RIR could
521521
provide the root of trust, and sign certificates for ISPs, who
522-
could then act as the certification authorities for their own routers. The
522+
could then act as the certificate authorities for their own routers. The
523523
use of the word "could" in this paragraph reflects the lack of
524524
real-world deployment of BGPsec.
525525

@@ -884,7 +884,7 @@ While there are obvious similarities to the chains of trust used for
884884
TLS, the notable difference here is that the chain of
885885
certificates that must be followed is precisely defined by the
886886
hierarchy of the DNS. Whereas a TLS certificate could be issued by a
887-
range of certification authorities, the certificates for any zone in
887+
range of certificate authorities, the certificates for any zone in
888888
DNSSEC must be issued by the parent zone. This has some advantages,
889889
such as limiting the opportunities for bad behavior by CAs that has
890890
occasionally occurred with TLS certificates. However, it also

key-distro.rst

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -98,14 +98,16 @@ perhaps directly from Alice—as long as they trust Bob and know his
9898
public key. You can see how starting from a very small number of keys
9999
(in this case, just Bob’s) you could build up a large set of trusted
100100
keys over time. Bob in this case is playing the role often referred to
101-
as a *certification authority* (CA), and much of today’s Internet
102-
security depends on CAs. VeriSign is one well-known commercial CA.
101+
as a *certificate authority* (CA), and much of today’s Internet
102+
security depends on CAs. There are many commercial and non-profit CAs
103+
in widespread use today. You may also see CA expanded as
104+
*certification authority*—the two expansions are equivalent.
103105

104106
One thing to note about the above example is that we have to know two
105107
things about Bob. First, we need to know his public key so that we can
106108
verify that certain messages were originated by Bob. But we also have
107109
to know that Bob is trustworthy enough to make statements about the
108-
keys of others, which is where certification authorities (rather than
110+
keys of others, which is where certificate authorities (rather than
109111
random individuals) come into play. We return to this topic below.
110112

111113
One of the major standards for certificates is known as X.509. This
@@ -138,7 +140,7 @@ domains.
138140
There are different ways a PKI could formalize the notion of trust. We
139141
discuss the two main approaches.
140142

141-
4.1.1 Certification Authorities
143+
4.1.1 Certificate Authorities
142144
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
143145

144146
In the first model, trust is binary; you either trust someone
@@ -152,10 +154,10 @@ In other words, all you need is a chain of certificates, all signed by
152154
entities you trust, as long as it leads back to an entity whose key you
153155
already know.
154156

155-
A *certification authority* or *certificate authority* (CA) is an entity
157+
A *certificate authority* or *certification authority* (CA) is an entity
156158
claimed (by someone) to be trustworthy for verifying identities and
157159
issuing public key certificates. There are commercial CAs, governmental
158-
CAs, and even free CAs. To use a CA, you must know its own key. You can
160+
CAs, and non-profit CAs. To use a CA, you must know its own key. You can
159161
learn that CA’s key, however, if you can obtain a chain of CA-signed
160162
certificates that starts with a CA whose key you already know. Then you
161163
can believe any certificate signed by that new CA.
@@ -172,7 +174,7 @@ trust for that participant.
172174
:width: 600px
173175
:align: center
174176

175-
Tree-structured certification authority hierarchy.
177+
Tree-structured certificate authority hierarchy.
176178

177179
There are some significant issues with building chains of trust. Most
178180
importantly, even if you are certain that you have the public key of the
@@ -296,7 +298,7 @@ distribution of the CRL to prolong the amount of time they can use the
296298
compromised key. A number of proposals have been made to improve the
297299
effectiveness of certificate revocation, such as using bit vectors or
298300
other compact representations of the CRL to reduce its size, and the
299-
development of the Online Certification Status Protocol (OCSP) to
301+
development of the Online Certificate Status Protocol (OCSP) to
300302
enable real-time checks on a certificate's status. At the time of
301303
writing, there are some best practices for handling certificate
302304
revocation but no comprehensive solution. A good discussion of the

tls.rst

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ between client and server will be encrypted. But we still have to rule
146146
out the MITM attack.
147147

148148
3. The server now sends one or more certificates. In the simplest
149-
case, there is a single certificate signed by a certification
149+
case, there is a single certificate signed by a certificate
150150
authority (CA) that is trusted by the client.
151151

152152
4. The server sends a "certificate verify" message, which proves that
@@ -528,7 +528,7 @@ need to consider how all the parts of a system interact with each
528528
other to form a coherent whole, rather than just looking at single
529529
components in isolation. For example, TLS is a system that includes
530530
both public-key and symmetric-key cryptography, authentication and
531-
privacy mechanisms, certification authorities, and sub-layers such as
531+
privacy mechanisms, certificate authorities, and sub-layers such as
532532
the record protocol and the handshake protocol. But the systems
533533
approach applies recursively too. As we have already seen, it is
534534
important to look at how TLS sits within the overall protocol stack,
@@ -552,7 +552,7 @@ another warning is presented. Users can generally choose to override
552552
these warnings but the overall effect is to reinforce behaviors that
553553
are more secure and discourage those that are insecure.
554554

555-
Certification authorities are a critical part of this overall
555+
Certificate authorities are a critical part of this overall
556556
system. Most users have no way to determine whether any given CA does
557557
its job properly. As discussed in Chapter 4, the way that CA
558558
hierarchies work means that a lot of trust is placed at the top-level

0 commit comments

Comments
 (0)