Related
Nathan Basanese After installing the certificate, it's hard to tell if I've successfully trusted a given certificate, especially for the root CA. To check if I have successfully installed a certificate without making an SSL request to a server that may or may
Nathan Basanese After installing the certificate, it's hard to tell if I've successfully trusted a given certificate, especially for the root CA. To check if I have successfully installed a certificate without making an SSL request to a server that may or may
stern agarwal Need to get a list of all user CA certificates installed on the device. We can get the system certificate by running adb shell cat /system/etc/security/cacerts/* | grep Issuer: Is there a similar way to get user certificate. If it's not possible,
Steven Ross I recently deployed a Dart server application that handles HTTP requests. I'd like to add support for HTTPS, so have been trying to add SSL to a Dart server application. This answer provides a clear explanation of how to add a self-signed SSL certi
Steven Ross I recently deployed a Dart server application that handles HTTP requests. I'd like to add support for HTTPS, so have been trying to add SSL to a Dart server application. This answer provides a clear explanation of how to add a self-signed SSL certi
Steven Ross I recently deployed a Dart server application that handles HTTP requests. I'd like to add support for HTTPS, so have been trying to add SSL to a Dart server application. This answer provides a clear explanation of how to add a self-signed SSL certi
Steven Ross I recently deployed a Dart server application that handles HTTP requests. I'd like to add support for HTTPS, so have been trying to add SSL to a Dart server application. This answer provides a clear explanation of how to add a self-signed SSL certi
Martin Vegter I get the following error when accessing Github over HTTPS: error: server certificate verification failed.
CAfile: /etc/ssl/certs/ca-certificates.crt CRLfile: none
This is because I don't have any certificates /etc/ssl/certs/in . I know how to
Martin Vegter I get the following error when accessing Github over HTTPS: error: server certificate verification failed.
CAfile: /etc/ssl/certs/ca-certificates.crt CRLfile: none
This is because I don't have any certificates /etc/ssl/certs/in . I know how to
username I have a PKI hierarchy as below. root-ca ---> signing-ca ---> sub-ca-1 ---> server-cert-1 (machine 1)
\
\--------> sub-ca-2 ---> server-cert-2 (machine 2)
I would like to know how to setup the CA on each computer.
username I have a PKI hierarchy as below. root-ca ---> signing-ca ---> sub-ca-1 ---> server-cert-1 (machine 1)
\
\--------> sub-ca-2 ---> server-cert-2 (machine 2)
I would like to know how to setup the CA on each computer.
Uri Lukach I'm writing a Java proxy that uses SSL to communicate with other servers. With ServerSocketFactory and keystore and truststore populated by server certificate everything works perfectly. I was wondering, is there a way in Java 7 to disable authentic
Uri Lukach I'm writing a Java proxy that uses SSL to communicate with other servers. With ServerSocketFactory and keystore and truststore populated by server certificate everything works perfectly. I was wondering, is there a way in Java 7 to disable authentic
Lynnash I have setup CA server in windows server. I have a client code in C# that creates a CSR to send to the server and downloads the issued certificate from the server. I was wondering is it possible to retrieve the list of certificate templates present in
Lynnash I have setup CA server in windows server. I have a client code in C# that creates a CSR to send to the server and downloads the issued certificate from the server. I was wondering is it possible to retrieve the list of certificate templates present in
light I'm writing some server code using the Python (2.7) SSL module as follows: ssock = ssl.wrap_socket(sock, ca_certs="all-ca.crt", keyfile="server.key", certfile="server.crt", server_side=True, ssl_version=ssl.PROTOCOL_TLSv1) 'all-ca.crt' contains the signi
light I'm writing some server code using the Python (2.7) SSL module as follows: ssock = ssl.wrap_socket(sock, ca_certs="all-ca.crt", keyfile="server.key", certfile="server.crt", server_side=True, ssl_version=ssl.PROTOCOL_TLSv1) 'all-ca.crt' contains the signi
username question Lets say I want to download each ssl certificate for a specific website so I can do certificate pinning later. How can I query a web server using openssl to download all available certificates without knowing any of its properties? example Th
Haizang-kun I have enabled ssl in my spring boot application and whenever i want to use a Rest service like googleapis or facebook i have to add a certificate in the truststore. I use openssl to get the certificate: openssl s_client -connect googleapis.com:443
username question Lets say I want to download each ssl certificate for a specific website so I can do certificate pinning later. How can I query a web server using openssl to download all available certificates without knowing any of its properties? example Th
grumble I want to access some web resources using HTTPS in a custom iOS 6 app. Some target servers are using a certificate signed by a CA, which is not included by default in iOS but has been manually added to the device's keychain. So all URLs can be opened i
grumble I want to access some web resources using HTTPS in a custom iOS 6 app. Some target servers are using a certificate signed by a CA, which is not included by default in iOS but has been manually added to the device's keychain. So all URLs can be opened i
Caio Lins So I'm trying to manually validate a request for an Alexa skill I'm developing, but can't "verify that all certificates in the chain are combined to create a chain of trust to a trusted root CA certificate". As shown in step 3.c of the documentation
Caio Lins So I'm trying to manually validate a request for an Alexa skill I'm developing, but can't "verify that all certificates in the chain are combined to create a chain of trust to a trusted root CA certificate". As shown in step 3.c of the documentation
Caio Lins So I'm trying to manually validate a request for an Alexa skill I'm developing, but can't "verify that all certificates in the chain are combined to create a chain of trust to a trusted root CA certificate". As shown in step 3.c of the documentation
Caio Lins So I'm trying to manually validate a request for an Alexa skill I'm developing, but can't "verify that all certificates in the chain are combined to create a chain of trust to a trusted root CA certificate". As shown in step 3.c of the documentation
Caio Lins So I'm trying to manually validate a request for an Alexa skill I'm developing, but can't "verify that all certificates in the chain are combined to create a chain of trust to a trusted root CA certificate". As shown in step 3.c of the documentation
e2-e4 In CentOS 6 (6.6), the drbd package is not available nor from the extras repository. There is some info online like configure-drbd-centos-6-5 which I think will work on CentOS 6.6. However, drbd is a good package, and there doesn't seem to be an "officia
Smith I feel like this should be simple, I know the centos 7 command, but I can't find the centos 6 command to list all enabled services. The Centos 7 command I have is systemctl list-unit-files | grep enabled
I got a nice list from all enabled services. I ju