What SSL Is, and Which Certificate Type is Right for You
This article is sponsored by GoGetSSL. Thank you for supporting the partners who made SitePoint possible.
The incidence of cybercrime has risen sharply over the past decade. Many well-known corporate organizations and government agencies that have not yet implemented adequate cybersecurity measures have suffered losses. Google has begun to take a tough stance on sites that do not use HTTPS. If a visitor is about to submit any information through an unsafe connection, a warning will be issued.
This article will guide you on how to protect customers and businesses from privacy violations and data theft. You will learn how to use SSL technology to protect your website and applications from leaking sensitive data to eavesdroppers.
This article will not explain how to install SSL, because this is an advanced topic. You can find more information about the installation process here.
Key Points
- SSL (Secure Sockets Layer) is an encryption protocol designed to protect communications on computer networks. It is especially important for protecting sensitive information transmitted over the Internet, such as login credentials and credit card details.
- SSL certificates are issued by Certificate Authority (CA) to verify the identity of the website and enable secure, encrypted communication. These certificates usually contain the subject name, public key, digital signature, issuer, and valid date.
- There are different types of SSL certificates to meet different needs, including domain validation SSL certificates, public IP SAN SSL, wildcard SSL, and multi-domain SSL certificates. The choice of a certificate depends on factors such as the number of domains and subdomains you want to protect, and whether you want to protect a public IP address.
- Legal Entity Identifier (LEI) is a unique code used to identify any global company involved in financial transactions. It can be used to simplify and speed up the business verification process for SSL certificates.
Simple explanation of SSL
Imagine you are in a hotel room, using your laptop to connect to the hotel's WIFI. You will be logged into the bank's online portal soon. Meanwhile, a malicious hacker cleverly booked the room next to you and set up a simple station to listen to all the network traffic in the hotel building. All traffic using the HTTP protocol can be viewed in plain text by hackers.
Suppose the bank's website only uses HTTP, then the form details such as username and password will be seen by the hacker once you press the submit button. So how do we protect this data? The answer is obviously encryption. Data encryption involves converting plain text data into something that looks garbled—that is, encrypted data. To encrypt plain text data, you need what is called an encryption algorithm and a password key.
Suppose you want to encrypt the following data:
<code>Come on over for hot dogs and soda!</code>
The encrypted form is as follows:
<code>Come on over for hot dogs and soda!</code>
Using current computing power, decrypting the above messages without a password key may take more than a lifetime. Unless they have a password key to encrypt it, no one can read it. This type of encryption is called symmetric encryption. Now that we have figured out how to protect the data, we need a secure way to securely transfer the password key to the recipient of the message. We can do this by using an asymmetric encryption system called public key encryption.
Public key encryption uses a pair of mathematically related password keys:
- Public key: can be shared safely with anyone
- Private key: It must not be transmitted, it must be kept confidential.
- Tubject name: personal, organization or machine name
- Public Key
- Digital signature (fingerprint of certificate)
- Issuer (the entity that signed the certificate)
- Expiration date (start date and expiration date)
<code>wUwDPglyJu9LOnkBAf4vxSpQgQZltcz7LWwEquhdm5kSQIkQlZtfxtSTsmaw q6gVH8SimlC3W6TDOhhL2FdgvdIC7sDv7G1Z7pCNzFLp0lgB9ACm8r5RZOBi N5ske9cBVjlVfgmQ9VpFzSwzLLODhCU7/2THg2iDrW3NGQZfz3SSWviwCe7G mNIvp5jEkGPCGcla4Fgdp/xuyewPk6NDlBewftLtHJVf =PAb3</code>
<code>46798b5cfca45c46a84b7419f8b74735</code>
- The certificate has not been changed by others
- We have evidence that the certificate is from the issuer because we have successfully decrypted the signature using its public key
- We can trust the authenticity of the public key attached to the SSL certificate.
Now, you may be wondering where we get the issuer's public key and why we should trust it. The issuer's public key is pre-installed in our operating system and browser. Issuer is a trusted certificate authority (CA) that signs certificates according to the official CA/browser forum guide and NIST recommendations. For example, here is a list of some trusted issuers/CAs that you will find on your Microsoft operating system. Even smartphones and tablets, operating systems and browsers have similar lists preinstalled.
According to a survey conducted by W3Techs in May 2018, the following authorities account for approximately 90% of valid certificates issued worldwide:
- IdenTrust
- Comodo
- DigiCert (acquired by Symantec)
- GoDaddy
- GlobalSign
Now that you have learned about encryption and SSL technology, it's best to review how to securely log into the bank portal using HTTPS without having your traffic read next door hackers.
- Your laptop browser first requests its SSL certificate from the bank's server.
- The server sends it. The browser then checks whether the certificate is true based on the trusted CA list. It also checks that the certificate has not expired and has not been revoked.
- If all checks pass, the browser will generate a new password key (also known as the session key). Use the public key found on the SSL certificate, encrypt it, and send it to the server.
- The server uses its private key to decrypt the session key.
- From now on, all back and forth communications will be encrypted using a session key. Symmetric encryption is faster than asymmetric encryption.
This means that form data sent from the laptop and HTML data from the server will be encrypted using a password key that is not accessible to the hacker. What you see in the captured traffic log will be just garbled letters and numbers. Your information is now protected from the Eye of Snooping.
Now that you understand how SSL works in general, let's move on to the next section to learn about the different types of SSL certificates we can use.
SSL type
Domain Verification SSL Certificate
Domain verification is the most affordable and common type of SSL certificate that can be issued to anyone to protect public domain websites. In order to purchase this type of SSL certificate, you need to prove that you are the owner of the domain you want to protect. That's why it's called domain validation. This is done in one or more of the following ways:
- Create DNS TXT record
- Reply to email contacts sent to the domain whois record for registered emails
- Reply to an email sent to a well-known administrative contact in your domain (such as admin@domain.com)
- Publish random numbers provided by automatic certificate issuance system
As of September 2019, Google Chrome is currently the most popular web browser, accounting for about 70% of the global desktop browser market share. Google recently strengthened its stance on site owners enforcing security protocols to ensure that end users’ privacy is protected. Unprotected websites will be marked as unsafe. If users try to submit forms to unprotected sites, they will also be strongly advised not to do so. If the SSL certificate of the website expires or is invalid, the website will be temporarily blocked.
If you don't want to lose valuable traffic because your website is not protected, you need to make sure you get at least a domain-verified SSL certificate. It only takes 5-8 minutes to obtain a certificate.
Public IP SAN SSL
SSL certificates are often used to protect fully qualified domain names, such as www.domain.com. If you want to protect a public IP address, you need to obtain a public IP SAN SSL certificate. SAN represents the principal alternative name, which is a field on the certificate field that can be used to save the IP address.
Wildcard SSL
The normal SSL certificate is only available for a single domain, such as www.domain.com. If you want to protect the subdomain, you must purchase a new SSL certificate for this. Instead of buying a new SSL certificate for each subdomain you manage, you can simply buy a wildcard SSL certificate, which will work for your subdomain, i.e. *.domain.com. It is more cost-effective than buying multiple SSL certificates. Using an SSL certificate is also easier to manage.
However, if the subdomain is compromised, it means that all subdomains using the same certificate are compromised. You need to revoke it and request a new certificate. If you don't want to encounter such problems, you can also purchase one separately.
Multi-domain SSL certificate
As the name implies, you can purchase a multi-domain SSL certificate, which can protect up to 250 domains and subdomains. This type of certificate is especially useful for protecting hundreds of office communication servers that may span different geographical areas. Even if the traffic is limited to the company's network, it's best to use SSL for protection, as rogue employees can easily monitor and record everyone's traffic.
Easy business verification with LEI code
Since 2019, organizations can be verified worldwide using LEI (Legal Entity Identifier) codes. This simplifies and significantly speeds up the verification process. Enterprises can obtain LEI codes through the official GLEIF registration agency.
Legal Entity Identifier (LEI) is a unique code used to identify any global company involved in financial transactions. This process is carried out in accordance with international standard ISO 17442. The goal is to help monitor and measure systemic risks and effectively and inexpensively support compliance with regulatory reporting requirements.
Summary
I hope you have enough information now to decide which SSL certificate to purchase. Please note that the SSL certificate is valid for only two years. This is a security feature that ensures that the information on the certificate remains up to date. It also ensures that any missing keys are not used to penetrate traffic. Free SSL certificates are usually valid for 90 days. If you want to make sure you don't forget to purchase renewal, you can get a 3-year or 4-year subscription plan. Please note that the two-year limit rate applies. You will receive a contact at the end of the expiration date to replace the certificate with a new one. The advantage of choosing a longer subscription plan is that you can save money compared to annual purchases.
SSL FAQ
What is SSL? SSL (Secure Sockets Layer) is an encryption protocol designed to provide secure communication on a computer network. It is usually used to protect data transfer between user's browser and website server.
Why is SSL important? SSL is important for protecting sensitive information transmitted over the Internet, such as login credentials, credit card details, and other personal data. It encrypts data to prevent unauthorized access and eavesdropping.
What is an SSL certificate? An SSL certificate is a digital certificate that is used to verify the identity of a website and enable secure, encrypted communication. It is issued by a Certificate Authority (CA) and contains information about the certificate holder.
How to get an SSL certificate for my website? To obtain an SSL certificate, you can purchase one from a Certificate Authority (CA), or use a certificate provided by a trusted CA, such as Let's Encrypt. After you have obtained the certificate, you need to install it on your web server.
What is HTTPS? HTTPS (Hypertext Transfer Protocol Security) is a secure version of HTTP. It uses the SSL/TLS protocol to encrypt data transmitted between the user's browser and the website server. Websites using HTTPS display lock symbols in the address bar.
The above is the detailed content of What SSL Is, and Which Certificate Type is Right for You. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

This Go-based network vulnerability scanner efficiently identifies potential security weaknesses. It leverages Go's concurrency features for speed and includes service detection and vulnerability matching. Let's explore its capabilities and ethical

This pilot program, a collaboration between the CNCF (Cloud Native Computing Foundation), Ampere Computing, Equinix Metal, and Actuated, streamlines arm64 CI/CD for CNCF GitHub projects. The initiative addresses security concerns and performance lim

This tutorial guides you through building a serverless image processing pipeline using AWS services. We'll create a Next.js frontend deployed on an ECS Fargate cluster, interacting with an API Gateway, Lambda functions, S3 buckets, and DynamoDB. Th

Stay informed about the latest tech trends with these top developer newsletters! This curated list offers something for everyone, from AI enthusiasts to seasoned backend and frontend developers. Choose your favorites and save time searching for rel
