×
1 Choose EITC/EITCA Certificates
2 Learn and take online exams
3 Get your IT skills certified

Confirm your IT skills and competencies under the European IT Certification framework from anywhere in the world fully online.

EITCA Academy

Digital skills attestation standard by the European IT Certification Institute aiming to support Digital Society development

LOG IN TO YOUR ACCOUNT

CREATE AN ACCOUNT FORGOT YOUR PASSWORD?

FORGOT YOUR PASSWORD?

AAH, WAIT, I REMEMBER NOW!

CREATE AN ACCOUNT

ALREADY HAVE AN ACCOUNT?
EUROPEAN INFORMATION TECHNOLOGIES CERTIFICATION ACADEMY - ATTESTING YOUR PROFESSIONAL DIGITAL SKILLS
  • SIGN UP
  • LOGIN
  • INFO

EITCA Academy

EITCA Academy

The European Information Technologies Certification Institute - EITCI ASBL

Certification Provider

EITCI Institute ASBL

Brussels, European Union

Governing European IT Certification (EITC) framework in support of the IT professionalism and Digital Society

  • CERTIFICATES
    • EITCA ACADEMIES
      • EITCA ACADEMIES CATALOGUE<
      • EITCA/CG COMPUTER GRAPHICS
      • EITCA/IS INFORMATION SECURITY
      • EITCA/BI BUSINESS INFORMATION
      • EITCA/KC KEY COMPETENCIES
      • EITCA/EG E-GOVERNMENT
      • EITCA/WD WEB DEVELOPMENT
      • EITCA/AI ARTIFICIAL INTELLIGENCE
    • EITC CERTIFICATES
      • EITC CERTIFICATES CATALOGUE<
      • COMPUTER GRAPHICS CERTIFICATES
      • WEB DESIGN CERTIFICATES
      • 3D DESIGN CERTIFICATES
      • OFFICE IT CERTIFICATES
      • BITCOIN BLOCKCHAIN CERTIFICATE
      • WORDPRESS CERTIFICATE
      • CLOUD PLATFORM CERTIFICATENEW
    • EITC CERTIFICATES
      • INTERNET CERTIFICATES
      • CRYPTOGRAPHY CERTIFICATES
      • BUSINESS IT CERTIFICATES
      • TELEWORK CERTIFICATES
      • PROGRAMMING CERTIFICATES
      • DIGITAL PORTRAIT CERTIFICATE
      • WEB DEVELOPMENT CERTIFICATES
      • DEEP LEARNING CERTIFICATESNEW
    • CERTIFICATES FOR
      • EU PUBLIC ADMINISTRATION
      • TEACHERS AND EDUCATORS
      • IT SECURITY PROFESSIONALS
      • GRAPHICS DESIGNERS & ARTISTS
      • BUSINESSMEN AND MANAGERS
      • BLOCKCHAIN DEVELOPERS
      • WEB DEVELOPERS
      • CLOUD AI EXPERTSNEW
  • FEATURED
  • SUBSIDY
  • HOW IT WORKS
  •   IT ID
  • ABOUT
  • CONTACT
  • MY ORDER
    Your current order is empty.
EITCIINSTITUTE
CERTIFIED

What are the advantages and disadvantages of key pinning, and why has it fallen out of favor despite its initial promise?

by EITCA Academy / Wednesday, 12 June 2024 / Published in Cybersecurity, EITC/IS/ACSS Advanced Computer Systems Security, Network security, Certificates, Examination review

Key pinning, also known as HTTP Public Key Pinning (HPKP), is a security mechanism that allows HTTPS websites to resist impersonation by attackers using misissued or otherwise fraudulent certificates. By specifying which public keys are supposed to be present in the certificate chain for a given domain, key pinning provides an additional layer of security that helps to ensure the authenticity and integrity of communications.

Advantages of Key Pinning

1. Mitigation of Man-in-the-Middle (MitM) Attacks: Key pinning significantly reduces the risk of MitM attacks. By defining a set of trusted public keys, a website can ensure that only certificates containing these keys are accepted by the browser, thereby preventing attackers from using fraudulent certificates issued by compromised or rogue Certificate Authorities (CAs).

2. Enhanced Security for High-Value Targets: For websites that handle sensitive data, such as financial institutions or government services, key pinning offers a robust mechanism to protect against certificate-based attacks. This is particularly important for high-value targets that are more likely to be targeted by sophisticated attackers.

3. Protection Against CA Compromise: In the event that a CA is compromised, key pinning can prevent attackers from successfully using certificates issued by the compromised CA. This is because the browser will reject any certificate that does not match the pinned public keys, rendering the fraudulent certificate useless.

4. Trust Anchors: Key pinning allows website operators to establish trust anchors, which are specific public keys that must be present in the certificate chain. This can provide a higher level of assurance than simply trusting any certificate issued by a CA.

Disadvantages of Key Pinning

1. Operational Complexity: Implementing and maintaining key pinning can be complex and error-prone. Website operators must carefully manage their pinsets and ensure that backup keys are available in case of key rotation. Failure to do so can result in the website being inaccessible if the pinned keys are no longer valid.

2. Risk of Lockout: One of the most significant risks associated with key pinning is the potential for lockout. If the pinned keys are lost or compromised, and no valid backup keys are available, users will be unable to access the website. This can lead to significant downtime and loss of trust.

3. Limited Browser Support: Although key pinning was supported by major browsers, its implementation and support have been inconsistent. Some browsers have deprecated or removed support for HPKP, reducing its effectiveness as a security measure.

4. Difficulty in Key Management: Effective key management is important for key pinning to work correctly. This includes generating, storing, and rotating keys securely. Mismanagement of keys can lead to security vulnerabilities or operational issues.

5. Potential for Misconfiguration: Incorrect configuration of key pinning can have severe consequences. For example, if a website pins a key that is later compromised or becomes invalid, users will be unable to connect to the site until the issue is resolved. This can be particularly problematic for websites that do not have a robust key management strategy in place.

Reasons for Falling Out of Favor

Despite its initial promise, key pinning has fallen out of favor in recent years. Several factors have contributed to this decline:

1. Introduction of More Flexible Alternatives: The development of more flexible and less error-prone alternatives, such as Certificate Transparency (CT) and the Expect-CT header, has provided website operators with other means to achieve similar security goals without the risks associated with key pinning. CT logs provide a public, verifiable record of certificate issuance, making it easier to detect and respond to misissued certificates.

2. Incidents of Lockout: There have been several high-profile incidents where websites inadvertently locked out their users due to misconfigured key pinning policies. These incidents have highlighted the risks and operational challenges associated with key pinning, leading many website operators to seek alternative solutions.

3. Deprecation by Major Browsers: Major browsers, such as Google Chrome and Mozilla Firefox, have deprecated support for HPKP. This deprecation has been driven by the complexity and risks associated with key pinning, as well as the availability of better alternatives. The lack of browser support has made key pinning less viable as a security measure.

4. Complexity and Cost: The complexity and cost of implementing and maintaining key pinning have deterred many website operators. The need for careful key management, the risk of lockout, and the potential for misconfiguration have made key pinning a less attractive option compared to other security measures.

5. Evolving Threat Landscape: The threat landscape has evolved, and attackers have developed new techniques to bypass traditional security measures. As a result, the security community has shifted its focus towards more comprehensive and adaptive security strategies, which can address a broader range of threats.

Examples

1. Google's Implementation of HPKP: Google was one of the early adopters of HPKP, implementing it for its own services to enhance security. However, even Google faced challenges with key pinning, and the company eventually decided to rely on other security measures such as Certificate Transparency and the Expect-CT header.

2. GitHub Incident: GitHub experienced an incident where a misconfigured HPKP policy resulted in users being unable to access the site. This incident highlighted the risks associated with key pinning and the potential for operational disruptions.

3. Cloudflare's Approach: Cloudflare initially supported HPKP but later deprecated it in favor of more flexible and less risky alternatives. Cloudflare's experience demonstrated the challenges of maintaining key pinning at scale and the benefits of adopting alternative security measures.

Conclusion

Key pinning offered a promising solution to enhance the security of HTTPS communications by mitigating the risks associated with fraudulent certificates. However, the operational complexity, risk of lockout, and potential for misconfiguration have made it a less attractive option for many website operators. The development of more flexible and less error-prone alternatives, such as Certificate Transparency and the Expect-CT header, has further contributed to the decline in the use of key pinning. As the threat landscape continues to evolve, the security community must remain vigilant and adapt its strategies to address emerging threats effectively.

Other recent questions and answers regarding Certificates:

  • How does the Online Certificate Status Protocol (OCSP) improve upon the limitations of Certificate Revocation Lists (CRLs), and what are the challenges associated with OCSP?
  • What are the potential vulnerabilities and limitations of the Certificate Authority (CA) system, and how can these be mitigated?
  • What steps does a client take to validate a server's certificate, and why are these steps crucial for secure communication?
  • How does the TLS protocol establish a secure communication channel between a client and a server, and what role do certificates play in this process?

More questions and answers:

  • Field: Cybersecurity
  • Programme: EITC/IS/ACSS Advanced Computer Systems Security (go to the certification programme)
  • Lesson: Network security (go to related lesson)
  • Topic: Certificates (go to related topic)
  • Examination review
Tagged under: Certificate Transparency, Cybersecurity, Expect-CT, HPKP, Key Management, Man-in-the-Middle
Home » Certificates / Cybersecurity / EITC/IS/ACSS Advanced Computer Systems Security / Examination review / Network security » What are the advantages and disadvantages of key pinning, and why has it fallen out of favor despite its initial promise?

Certification Center

USER MENU

  • My Account

CERTIFICATE CATEGORY

  • EITC Certification (105)
  • EITCA Certification (9)

What are you looking for?

  • Introduction
  • How it works?
  • EITCA Academies
  • EITCI DSJC Subsidy
  • Full EITC catalogue
  • Your order
  • Featured
  •   IT ID
  • EITCA reviews (Medium publ.)
  • About
  • Contact

EITCA Academy is a part of the European IT Certification framework

The European IT Certification framework has been established in 2008 as a Europe based and vendor independent standard in widely accessible online certification of digital skills and competencies in many areas of professional digital specializations. The EITC framework is governed by the European IT Certification Institute (EITCI), a non-profit certification authority supporting information society growth and bridging the digital skills gap in the EU.

Eligibility for EITCA Academy 80% EITCI DSJC Subsidy support

80% of EITCA Academy fees subsidized in enrolment by

    EITCA Academy Secretary Office

    European IT Certification Institute ASBL
    Brussels, Belgium, European Union

    EITC / EITCA Certification Framework Operator
    Governing European IT Certification Standard
    Access contact form or call +32 25887351

    Follow EITCI on X
    Visit EITCA Academy on Facebook
    Engage with EITCA Academy on LinkedIn
    Check out EITCI and EITCA videos on YouTube

    Funded by the European Union

    Funded by the European Regional Development Fund (ERDF) and the European Social Fund (ESF) in series of projects since 2007, currently governed by the European IT Certification Institute (EITCI) since 2008

    Information Security Policy | DSRRM and GDPR Policy | Data Protection Policy | Record of Processing Activities | HSE Policy | Anti-Corruption Policy | Modern Slavery Policy

    Automatically translate to your language

    Terms and Conditions | Privacy Policy
    EITCA Academy
    • EITCA Academy on social media
    EITCA Academy


    © 2008-2025  European IT Certification Institute
    Brussels, Belgium, European Union

    TOP
    Chat with Support
    Chat with Support
    Questions, doubts, issues? We are here to help you!
    End chat
    Connecting...
    Do you have any questions?
    Do you have any questions?
    :
    :
    :
    Send
    Do you have any questions?
    :
    :
    Start Chat
    The chat session has ended. Thank you!
    Please rate the support you've received.
    Good Bad