pki

What does “wsse:InvalidSecurity” mean?

耗尽温柔 提交于 2019-12-09 23:58:11
问题 An error was discovered processing the <wsse:Security> header This is a WS-Security question btw... I can't see anything wrong with my WS endpoint (apart from the fact that it's running in a TIBCO BW engine!). Does someone have any 'prior' with this kind of error? I realise that the WS-Security Header could be broken anywhere presumably to get this error but, there's GOT to be a 90% percentile on some kind of common error. Here's the secured SOAP - the client is standalone java (WSS4J 1.5.0)

iOS hardware-backed key attestation

风流意气都作罢 提交于 2019-12-09 18:03:24
问题 In android there is a way of knowing if the public key from a key pair was generated inside TEE and is, therefore, hardware-backed (https://source.android.com/security/keystore/attestation). I cannot find a way to do that in iOS. Does anyone know if there is a way? 回答1: I am not aware of a directly similar possibility, but if your app lives on a not-jailbroken device you can create keys and store them inside of the Secure Enclave of your iOS device and be sure that they are stored securely

Does X509TrustManagerImpl.checkServerTrusted() handle OCSP by itself if the appropriate properties are set?

我是研究僧i 提交于 2019-12-09 07:16:17
问题 public class CustomTrustManager implements X509TrustManager { private X509TrustManager trustManager; // If a connection was previously attempted and failed the certificate check, that certificate chain will be saved here. private Certificate[] rejectedCertificates = null; private Certificate[] encounteredCertificates = null; private KeyStore keyStore = null; private Logger logger; /** * Constructor * * @param loggerFactory * see {@link InstanceLoggerFactory} */ public CustomTrustManager

How to use PKI (public/private key) encryption in Ruby? [duplicate]

时间秒杀一切 提交于 2019-12-08 07:55:07
问题 This question already has answers here : Ruby: file encryption/decryption with private/public keys (4 answers) Closed 3 years ago . I want to encrypt a string such that the end user can verify it was encrypted by me, but such that they can't encrypt it themselves. For example, I have a private key 'private', a public key 'public', a message 'hello world' and want to do something like: private_key = 'private' public_key = 'public' message = 'hello world' encrypted_value = Crypto.encrypt

How to configure JNDI Realm with Tomcat 7 for PKI User Certificate Authentication?

依然范特西╮ 提交于 2019-12-08 06:52:58
问题 List, I have actually searched extensively on this topic and either a) I don't know how to configure something and/or b) I don't quite understand what a JNDI Realm actually is supposed to do. I am using Tomcat 7.0.32 with jdk 1.7.0_15. Here is what I want to do. I work with customers that use PKI User Certificates. The user certificates have a cn like "Joe Smith". What I need to be able to do is look up this CN in LDAP and get the users id, which may be something like "jsmith23", and populate

PKI authentication for OpenRasta

断了今生、忘了曾经 提交于 2019-12-08 05:26:57
问题 I'm looking at implementing PKI authentication ( 2 way SSL requiring x.509 certificates) for OpenRasta service. Any ideas on how to go about this? Thanks 回答1: I assume that you're using the HttpListener hosting. To enable SSL / Client certifiacates, those settings are set by httpcfg. You can find some information at http://msdn.microsoft.com/en-us/library/ms733791.aspx. More specifically, you should be able to enable SSL with client certificates using httpcfg set ssl -i 0.0.0.0:8012 -h

Revoked X509Certificate

给你一囗甜甜゛ 提交于 2019-12-08 04:32:57
问题 How can I programmatically get when X509Certificate is revoked? I can get information if certificate is revoked, but i need to get when is revoked, i think that CRL list have that info, but can someone tell me how to read that. 回答1: Revocation status is checked by (a) obtaining CRL lists and checking if the certificate is listed there, and (b) sending an OCSP request to the server to check the same. .NET doesn't let you do this. CryptoAPI might have some means for these operations, but the

Generating a CSR in Python

放肆的年华 提交于 2019-12-08 02:20:20
问题 I'm trying to generate a CSR in Python without using OpenSSL. If someone could point in the right direction, I'd be very grateful. 回答1: I assume you don't want to use the command line openssl itself and a Python lib is ok. Here is an helper function I wrote to create a CSR. It returns the private key from the generated key pair and the CSR. The function depends on pyOpenSSL.crypto. def create_csr(self, common_name, country=None, state=None, city=None, organization=None, organizational_unit

Error: KeyUsage does not allow digital signatures - Java-applet + mutual SSL

走远了吗. 提交于 2019-12-08 01:04:22
问题 We have developed a webbased Java application running in Tomcat under IIS on Windows 2008. The website has 2-way (mutual) SSL enabled in IIS requiring the client to authenticate using a x.509 certificate (PKI) as part of SSL and this works fine with all our certificates using IE. The website also has a java-applet called ViewOne ImageViewer. This works fine with 2-way SSL with some of our certificates but with others we get the exception on the client (java 1.6) during SSL-handshake after the

x509certificate certpath validation

不羁岁月 提交于 2019-12-07 20:08:22
问题 Our use-case requires validating certificate revocation via OCSP on a PKIX set-up. My starting point was the code at this related question: OCSP Revocation on client certificate I'm doing it manually at the application level since tomcat doesn't support it. However, I'm having some trouble building the certPath and I think I'm missing some fundamental understanding. First I try to create the certPath for the incoming client x509Certificate. KeyStore store is initialized correctly and contains