Related
Olof Bierman I'm doing an assignment on SSL and I think I understand the basics of how to use certificates with asymmetric and symmetric encryption. But I'm having a hard time understanding some of the details of how the trust hierarchy works. Specifically, wh
Harvey I have a Kubernetes cluster hosting my own docker registry built with the following docs : https://github.com/kubernetes/kubernetes/tree/master/cluster/addons/registry and https://github.com/kubernetes/kubernetes /blob/master/cluster/addons/registry/tls
Kit Sunde If someone visits Site A with a GoDaddy-issued certificate that also provides an intermediate certificate between GoDaddy and its CA, then Firefox will cache that intermediate certificate and compare it with a site that also has a GoDaddy-issued cert
Kit Sunde If someone visits Site A with a GoDaddy-issued certificate that also provides an intermediate certificate between GoDaddy and its CA, then Firefox will cache that intermediate certificate and compare it with a site that also has a GoDaddy-issued cert
Lexicore Is it possible to verify signatures with only ancestor or root certificates in the hierarchy? Disclaimer: I'm new to certificate handling, so please forgive the simplistic terminology. Consider the following situation. We have two parties ( for the id
Lexicore Is it possible to verify signatures with only ancestor or root certificates in the hierarchy? Disclaimer: I'm new to certificate handling, so please forgive the simplistic terminology. Consider the following situation. We have two parties ( for the id
Paul Sanwald My registrar gandi gave me the intermediate certificate to install, so I have 3 files: Private key file (server.key) Certificate file (mycert.crt) Intermediate Certificate (GandiSomething.pem) I am using SSL Beta service on heroku . heroku CLI her
Paul Sanwald My registrar gandi gave me the intermediate certificate to install, so I have 3 files: Private key file (server.key) Certificate file (mycert.crt) Intermediate Certificate (GandiSomething.pem) I am using SSL Beta service on heroku . heroku CLI her
Lexicore Is it possible to verify signatures with only ancestor or root certificates in the hierarchy? Disclaimer: I'm new to certificate handling, so please forgive the simplistic terminology. Consider the following situation. We have two parties ( for the id
Lexicore Is it possible to verify signatures with only ancestor or root certificates in the hierarchy? Disclaimer: I'm new to certificate handling, so please forgive the simplistic terminology. Consider the following situation. We have two parties ( for the id
Lesha Ppiev I want to provide ssl support for my website under Nginx. First, I tried to use a self-signed certificate, but as you know, the browser complains The current connection cannot be trusted Second, I tried ordering a free certificate from a reputable
Lesha Ppiev I want to provide ssl support for my website under Nginx. First, I tried to use a self-signed certificate, but as you know, the browser complains The current connection cannot be trusted Second, I tried ordering a free certificate from a reputable
Ilya V. Schurov I have an autoencoder model in Tensorflow that can be roughly written (this is an unrealistic simplified example): x = tf.placeholder(tf.float32, input_shape, name='x')
# encoder part:
W = tf.Variable(tf.random_uniform(shape, -1, 1))
z = relu(
Ilya V. Schurov I have an autoencoder model in Tensorflow that can be roughly written (this is an unrealistic simplified example): x = tf.placeholder(tf.float32, input_shape, name='x')
# encoder part:
W = tf.Variable(tf.random_uniform(shape, -1, 1))
z = relu(
Ilya V. Schurov I have an autoencoder model in Tensorflow that can be roughly written (this is an unrealistic simplified example): x = tf.placeholder(tf.float32, input_shape, name='x')
# encoder part:
W = tf.Variable(tf.random_uniform(shape, -1, 1))
z = relu(
Ilya V. Schurov I have an autoencoder model in Tensorflow that can be roughly written (this is an unrealistic simplified example): x = tf.placeholder(tf.float32, input_shape, name='x')
# encoder part:
W = tf.Variable(tf.random_uniform(shape, -1, 1))
z = relu(
Zbyszekkxy The server sends two certificates during the SSL handshake, the domain certificate and the signed intermediate certificate DigiCert Global Root CA. I can verify the intermediate certificate # openssl verify intermediate.pem
cert2.pem: OK
but not a
username I'm currently migrating my service hosting from managed hosting (running Lighspeed + Cpanel) to my own managed hosting (running Nginx). Everything works fine with Nginx 1.6.0, but my problem is that my certificate shows up as self-signed . I followed
Zbyszekkxy The server sends two certificates during the SSL handshake, the domain certificate and the signed intermediate certificate DigiCert Global Root CA. I can verify the intermediate certificate # openssl verify intermediate.pem
cert2.pem: OK
but not a
Zbyszekkxy The server sends two certificates during the SSL handshake, the domain certificate and the signed intermediate certificate DigiCert Global Root CA. I can verify the intermediate certificate # openssl verify intermediate.pem
cert2.pem: OK
but not a
Zbyszekkxy The server sends two certificates during the SSL handshake, the domain certificate and the signed intermediate certificate DigiCert Global Root CA. I can verify the intermediate certificate # openssl verify intermediate.pem
cert2.pem: OK
but not a
uprising: Still new to cryptography, I stumble across something simple every day. Today is just one of those days. I want to validate smime messages in Java using the bouncy castle library, I think I almost got it, but the current problem is the construction o
Neil Traft: I'm using Apache's HTTPClient in Java and trying to connect to graph.facebook.com. I get the "SSLPeerUnverifiedException: No peer certificate" error, so I guess Facebook's CA is not in the default keystore. So I need to create my own keystore with
Neil Traft: I'm using Apache's HTTPClient in Java and trying to connect to graph.facebook.com. I get the "SSLPeerUnverifiedException: No peer certificate" error, so I guess Facebook's CA is not in the default keystore. So I need to create my own keystore with
light I'm writing some server code using the Python (2.7) SSL module as follows: ssock = ssl.wrap_socket(sock, ca_certs="all-ca.crt", keyfile="server.key", certfile="server.crt", server_side=True, ssl_version=ssl.PROTOCOL_TLSv1) 'all-ca.crt' contains the signi
Naftuli Kay I have a self signed root certificate and an intermediate certificate signed by that root. Basically something like this: .
└── master (CA)
└── servant1 (CA)
I have some client certificates from master->servant1certificate chain : .
└── master
uprising: Still new to cryptography, I stumble across something simple every day. Today is just one of those days. I want to validate smime messages in Java using the bouncy castle library, I think I almost got it, but the current problem is the construction o
Neil Traft: I'm using Apache's HTTPClient in Java and trying to connect to graph.facebook.com. I get the "SSLPeerUnverifiedException: No peer certificate" error, so I guess Facebook's CA is not in the default keystore. So I need to create my own keystore with
light I'm writing some server code using the Python (2.7) SSL module as follows: ssock = ssl.wrap_socket(sock, ca_certs="all-ca.crt", keyfile="server.key", certfile="server.crt", server_side=True, ssl_version=ssl.PROTOCOL_TLSv1) 'all-ca.crt' contains the signi