Related
Zbyszekkxy The server sends two certificates during the SSL handshake, the domain certificate and the signed intermediate certificate DigiCert Global Root CA. I can verify the intermediate certificate # openssl verify intermediate.pem
cert2.pem: OK
but not a
Zbyszekkxy The server sends two certificates during the SSL handshake, the domain certificate and the signed intermediate certificate DigiCert Global Root CA. I can verify the intermediate certificate # openssl verify intermediate.pem
cert2.pem: OK
but not a
Zbyszekkxy The server sends two certificates during the SSL handshake, the domain certificate and the signed intermediate certificate DigiCert Global Root CA. I can verify the intermediate certificate # openssl verify intermediate.pem
cert2.pem: OK
but not a
uprising: Still new to cryptography, I stumble across something simple every day. Today is just one of those days. I want to validate smime messages in Java using the bouncy castle library, I think I almost got it, but the current problem is the construction o
Neil Traft: I'm using Apache's HTTPClient in Java and trying to connect to graph.facebook.com. I get the "SSLPeerUnverifiedException: No peer certificate" error, so I guess Facebook's CA is not in the default keystore. So I need to create my own keystore with
Neil Traft: I'm using Apache's HTTPClient in Java and trying to connect to graph.facebook.com. I get the "SSLPeerUnverifiedException: No peer certificate" error, so I guess Facebook's CA is not in the default keystore. So I need to create my own keystore with
uprising: Still new to cryptography, I stumble across something simple every day. Today is just one of those days. I want to validate smime messages in Java using the bouncy castle library, I think I almost got it, but the current problem is the construction o
Neil Traft: I'm using Apache's HTTPClient in Java and trying to connect to graph.facebook.com. I get the "SSLPeerUnverifiedException: No peer certificate" error, so I guess Facebook's CA is not in the default keystore. So I need to create my own keystore with
Adam Use Windows Server Core. I want to disable certificates in store root folder. I have the certificate thumbprint that I want to disable, and according to the image below, I can do this through the Windows UI. But I want to do it through Powershell. I can't
jeremy b. Using PowerShell; I need to get a certificate file (.cer/.crt) and export the intermediate and root signed certificate files to the same directory. The most I can do is get the certificate issuer name (intermediate CA). How can I use PowerShell to de
Harvey I have a Kubernetes cluster hosting my own docker registry built with the following docs : https://github.com/kubernetes/kubernetes/tree/master/cluster/addons/registry and https://github.com/kubernetes/kubernetes /blob/master/cluster/addons/registry/tls
Kit Sunde If someone visits Site A with a GoDaddy-issued certificate that also provides an intermediate certificate between GoDaddy and its CA, then Firefox will cache that intermediate certificate and compare it with a site that also has a GoDaddy-issued cert
Kit Sunde If someone visits Site A with a GoDaddy-issued certificate that also provides an intermediate certificate between GoDaddy and its CA, then Firefox will cache that intermediate certificate and compare it with a site that also has a GoDaddy-issued cert
Jeevan Roy dsouza I have created self signed certificate and installed in server. To enable https in android, ca root certificate is required. Android doesn't work with self-signed certificate? galbenheim The documentation at http://developer.android.com/train
Jeevan Roy dsouza I have created self signed certificate and installed in server. To enable https in android, ca root certificate is required. Android doesn't work with self-signed certificate? galbenheim The documentation at http://developer.android.com/train
Paul Wilhus My question is about non-repudiation using Java keystore and truststore in TLS. The root and intermediate certificates are in the keystore and truststore and they validate another certificate. If they were manipulated, they could verify the wrong c
mr munch I'm trying to create a self-signed root certificate, intermediate certificate and end user certificate, but for some reason I can only verify the intermediate certificate, so the whole chain fails. Here is the command I use to create the certificate:
Trinayan I am trying to implement root CA and intermediate CA for my network setup. I have created root CA and intermediate CA and have registered and registered all members of the organization i.e. orderers, peers, administrators, users. Everything works fine
mr munch I'm trying to create a self signed root certificate, intermediate certificate and end user certificate, but for some reason I can only verify the intermediate certificate, so the whole chain fails. Here is the command I use to create the certificate:
Trinayan I am trying to implement root CA and intermediate CA for my network setup. I have created root CA and intermediate CA and have registered and registered all members of the organization i.e. orderers, peers, administrators, users. Everything works fine
Trinayan I am trying to implement root CA and intermediate CA for my network setup. I have created root CA and intermediate CA and have registered and registered all members of the organization i.e. orderers, peers, administrators, users. Everything works fine
dplesa My company has its own ROOTcertificate. They signed the certificate with this intermediatecertificate. We then issued a CSR for the servercertificate and signed it with intermediatethe certificate . What is the correct way to import the ROOTcertificate
Olof Bierman I'm doing an assignment on SSL and I think I understand the basics of how to use certificates with asymmetric and symmetric encryption. But I'm having a hard time understanding some of the details of how the trust hierarchy works. Specifically, wh
Clayton Strow I get back the error: The underlying connection was closed: Could not establish trust relationship for SSL/TLS secure channel. How to install new certificate chain in azure? I have tried including new strings in the pfx file without success. When
ky Using PEM catdoes the job just fine: cat key.pem cert.pem >cert+key.pem
Extraction works fine openssl pkey -text -noout -in cert+key.pem # OK
openssl x509 -text -noout -in cert+key.pem # OK
But using DER doesn't work properly. cat cert.der key.der >cert
ky Using PEM catdoes the job just fine: cat key.pem cert.pem >cert+key.pem
Extraction works fine openssl pkey -text -noout -in cert+key.pem # OK
openssl x509 -text -noout -in cert+key.pem # OK
But using DER doesn't work properly. cat cert.der key.der >cert
ky Using PEM catdoes the job just fine: cat key.pem cert.pem >cert+key.pem
Extraction works fine openssl pkey -text -noout -in cert+key.pem # OK
openssl x509 -text -noout -in cert+key.pem # OK
But using DER doesn't work properly. cat cert.der key.der >cert
ky Using PEM catdoes the job just fine: cat key.pem cert.pem >cert+key.pem
Extraction works fine openssl pkey -text -noout -in cert+key.pem # OK
openssl x509 -text -noout -in cert+key.pem # OK
But using DER doesn't work properly. cat cert.der key.der >cert
ky Using PEM catdoes the job just fine: cat key.pem cert.pem >cert+key.pem
Extraction works fine openssl pkey -text -noout -in cert+key.pem # OK
openssl x509 -text -noout -in cert+key.pem # OK
But using DER doesn't work properly. cat cert.der key.der >cert