Why Are Self-Signed Certificates Used For Sensor Communication?
book
Article ID: 287229
calendar_today
Updated On:
Products
Carbon Black EDR (formerly Cb Response)
Issue/Introduction
Why are self-signed certificates used for sensor communication?
Environment
Carbon Black EDR Server: All Versions
Carbon Black EDR Sensor: All Versions
Resolution
Sensor to server communications use statically pinned SSL certificates for both client and server.
Internally signed CA certificates can be configured in the console see Managing Certificates.
Additional Information
Unlike browser-based trust models, the use of self-signed certificates for endpoint to server communication has increased security benefits.
Browser based relies on Certificate Authorities to deploy their root certificate on all major browsers. Then each certificate for individual domains must validate ownership. A self signed certificate in a browser does not have a way to accurately get validity of the certificate.
The sensor must first validate the certificate sent by the server against the known certificate installed with the sensor. The server must then validate the client group cert against the internally signed client CA, validate matching client certificate is active for the sensor group and validate revocation status, if these are not correct the connection is terminated. The self signed server certificate (cb-server.crt/key) and client CA (cb-client-ca.crt/key) are generated by the EDR application at the time of cbinit. Each sensor group get's a unique certificate signed by the client CA upon creation of the sensor group.