ssl-certificate

How to chain a SSL server certificate with the intermediate and root CA certificates?

北城以北 提交于 2021-02-10 14:29:42
问题 I thought I understood, but it is not working! I read among others http://binblog.info/2010/02/02/lengthy-chains/ which is the cleanest explanation I found. Background: Comodo's cheap PositiveSSL server certificate came with a root and two intermediate CA certificates (I replaced my FQDN with myserver.com): $ unzip ../myserver_com.commodo.certificate.zip Archive: ../myserver_com.commodo.certificate.zip extracting: AddTrustExternalCARoot.crt extracting: COMODORSAAddTrustCA.crt extracting:

Extend/renew a p12 certificate self signed expired

不想你离开。 提交于 2021-02-10 13:27:12
问题 Our adobe air application p12 certificate is already expired. Are there any ways to renew to same certificate without having to create another one? 回答1: A renewed certificate is nothing else then using the same Certificate Signing Request, which includes the Subject information and the public key, and sign it again by the Certificate Agency (in this case you again because it is self-signed), although with a changed expire time. So, extending a certificate will create a a new one, although

Android, access System private/public certificates

允我心安 提交于 2021-02-10 08:36:44
问题 Android System has a builtin certificate Store. The certificates from this store are for example used when making an Exchange Account or setting up a wireless LAN. This there some way to use the certificates in my own application? I would prefer this to managing my own certificate store. An Android 4.0+ solution is acceptable for me. 回答1: Yes, 4.0+ is what you'll need though: Using KeyChain Here's the original blogpost Excerpt : New in ICS: KeyChain To bridge the gap in ICS, there’s a new API

Using a p12 file without a password in Java

人走茶凉 提交于 2021-02-08 13:58:15
问题 Try as I might, I can't figure out how to use a .p12 file without a password in Java. I've tried setting javax.net.ssl.keyStorePassword to "" but whatever I do I get the following SSL error: HTTP transport error: javax.net.ssl.SSLHandshakeException: Remote host closed connection during handshake All my googling would suggest that the sun implementation will not allow an empty password and of course the keytool won't let you import any certificate without a password for the store. 回答1: The Sun

Converting a Certificate Revocation List (CRL) file from .crl to .pem extension - Python 3

折月煮酒 提交于 2021-02-08 11:38:45
问题 I am developing a Python 3.4 application component which checks if a URL's certificate exists in the CRL provided by its CA. I am using a cryptography package to load a certificate as well as the CRL. Below is the section of the code; from cryptography import x509 from cryptography.hazmat.backends import default_backend from cryptography.x509.oid import ExtensionOID from cryptography.x509.oid import NameOID import urllib.request URL = "www.xxx.com" cert_str = ssl.get_server_certificate((URL

Converting a Certificate Revocation List (CRL) file from .crl to .pem extension - Python 3

て烟熏妆下的殇ゞ 提交于 2021-02-08 11:37:00
问题 I am developing a Python 3.4 application component which checks if a URL's certificate exists in the CRL provided by its CA. I am using a cryptography package to load a certificate as well as the CRL. Below is the section of the code; from cryptography import x509 from cryptography.hazmat.backends import default_backend from cryptography.x509.oid import ExtensionOID from cryptography.x509.oid import NameOID import urllib.request URL = "www.xxx.com" cert_str = ssl.get_server_certificate((URL

SSL settings spring boot

岁酱吖の 提交于 2021-02-08 09:22:29
问题 I have some questions about ssl in spring boot. I have files certifications and private key with extension .crt and .key. how can I get from them right format for settings in spring boot like this server.ssl.key-store-type=PKCS12 server.ssl.key-store=classpath:keystore.p12 server.ssl.key-store-password=password server.ssl.key-alias=tomcat 回答1: To convert a certificate file and private key to PKCS#12(.p12) format, use the below command: openssl pkcs12 -export -out certificate.p12 -inkey

Why do I get [SSL: CERTIFICATE_VERIFY_FAILED] in Python when ssl setup looks OK?

有些话、适合烂在心里 提交于 2021-02-08 05:23:25
问题 I'm working on a Python app to comunicate with a service running on localhost via secure websocket protocol. Here is a sample code: import json import asyncio import websockets import ssl import certifi ssl_context = ssl.create_default_context() ssl_context.load_verify_locations(certifi.where()) ssl_context.load_default_certs() query = { "jsonrpc": "2.0", "method": "queryHeadsets", "params": {}, "id": 1 } json = json.dumps(query) async def query(json): async with websockets.connect("wss:/

Enable SSL certificate revocation checking in OpenJDK 11

≯℡__Kan透↙ 提交于 2021-02-08 02:37:51
问题 Is there some quick "declarative" way in Java 11, instead of a tedious manual implementation, to enable checking if a certificate is revoked? I tried to use properties from this answer: Check X509 certificate revocation status in Spring-Security before authenticating with this dummy revoked certificate: https://revoked.badssl.com but the code always accepts the certificate. Am I doing something wrong or these properties are no more actual for Java 11? If so, do we have any alternatives? Below

Let's Encrypt Certificate Issuance

十年热恋 提交于 2021-02-07 20:51:20
问题 I am trying to get a certificate issued from Let's Encrypt, and it has been 3 and a half hours. I accidentally originally set my secretName as "echo-tls" before switching it to the correct "pandaist-tls" that I want to use instead. I currently have this: kubectl get CertificateRequest -o wide NAME READY ISSUER STATUS AGE pandaist-tls-1926992011 False letsencrypt-prod Waiting on certificate issuance from order default/pandaist-tls-1926992011-2163900139: "pending" 3h26m When I describe the