ssl

Verify CRL signature against its root CA

亡梦爱人 提交于 2021-02-08 08:15:20
问题 I'm currently trying to verify that the CRL I download from a URL is a valid file, signed by the corresponding Certificate Authority. With OpenSSL, you can do this as follows : https://www.openssl.org/docs/manmaster/apps/crl.html Example with the CRL issued from CertEurope : openssl crl -in certeurope_v3.crl -inform der -CAfile certeurope_advanced_v3.cer (The CRL file and the CA file are downloaded from this URL : https://www.certeurope.fr/chaine-de-confiance ) CA file : https://www

Verify CRL signature against its root CA

无人久伴 提交于 2021-02-08 08:15:17
问题 I'm currently trying to verify that the CRL I download from a URL is a valid file, signed by the corresponding Certificate Authority. With OpenSSL, you can do this as follows : https://www.openssl.org/docs/manmaster/apps/crl.html Example with the CRL issued from CertEurope : openssl crl -in certeurope_v3.crl -inform der -CAfile certeurope_advanced_v3.cer (The CRL file and the CA file are downloaded from this URL : https://www.certeurope.fr/chaine-de-confiance ) CA file : https://www

CamelJettyWebSocketServer, fatal error: 42: null cert chain

让人想犯罪 __ 提交于 2021-02-08 07:35:24
问题 I try to set up a mutually authenticated connection in a custom camel endpoint. I try to run a test. When I set ClientAuthentication.REQUIRE to NONE , a TLS connection is established and all is fine. I would like to have mutual authentication on connections, though. When i set the flag to REQUIRE , I get (with enabled full debug output): CamelJettyWebSocketServer-40, fatal error: 42: null cert chain javax.net.ssl.SSLHandshakeException: null cert chain What puzzles me: When i do not activate

Python SSL FTP connection timing out

陌路散爱 提交于 2021-02-08 06:58:46
问题 I'm trying to get a connection established to a FTP server with SSL from within Python (v3.3.0). But I keep getting a timeout. I am NOT using port 990 as the SSL port (paranoid). Would that be the cause of this problem? And if so, how do I specify the port I am using? Here's my script: from ftplib import FTP from ftplib import FTP_TLS ftps = FTP_TLS('ip address') ftps.auth() ftps.sendcmd('USER uname') ftps.sendcmd('PASS password') ftps.prot_p() ftps.retrlines('LIST') ftps.close() And here is

iOS9 WKWebview didReceiveAuthenticationChallenge called with host null

风格不统一 提交于 2021-02-08 06:33:14
问题 I am using WKWebview (iOS 9) to load https://self-signed.badssl.com/ While as a delegate didReceiveAuthenticationChallenge is getting called, I'm receiving incomplete protectionSpace details e.g. host is null & authenticationMethod is NSURLAuthenticationMethodDefault (it should be NSURLAuthenticationMethodServerTrust ) po challenge.protectionSpace <NSURLProtectionSpace: 0x7ff30c40fb90>: Host:(null), Server:http, Auth-Scheme:NSURLAuthenticationMethodDefault, Realm:(null), Port:0, Proxy:NO,

iOS9 WKWebview didReceiveAuthenticationChallenge called with host null

不打扰是莪最后的温柔 提交于 2021-02-08 06:33:10
问题 I am using WKWebview (iOS 9) to load https://self-signed.badssl.com/ While as a delegate didReceiveAuthenticationChallenge is getting called, I'm receiving incomplete protectionSpace details e.g. host is null & authenticationMethod is NSURLAuthenticationMethodDefault (it should be NSURLAuthenticationMethodServerTrust ) po challenge.protectionSpace <NSURLProtectionSpace: 0x7ff30c40fb90>: Host:(null), Server:http, Auth-Scheme:NSURLAuthenticationMethodDefault, Realm:(null), Port:0, Proxy:NO,

Rails InvalidAuthenticityToken with HTTPS + ELB

こ雲淡風輕ζ 提交于 2021-02-08 05:38:46
问题 I'm trying to get HTTPS to work for my site, but I'm getting ActionController::InvalidAuthenticityToken for all post requests. I logged the form_authenticity_param and form_authenticity_token and they are in fact different. The SSL is resolved at the Elastic Load Balancer and a non-SSL request is sent to the web app. The expected CSRF token is stored in the cookie-based session, so the sessions for HTTP and HTTPS appear to expect different tokens. When using HTTP on the site, the post/put

Rails InvalidAuthenticityToken with HTTPS + ELB

风流意气都作罢 提交于 2021-02-08 05:38:40
问题 I'm trying to get HTTPS to work for my site, but I'm getting ActionController::InvalidAuthenticityToken for all post requests. I logged the form_authenticity_param and form_authenticity_token and they are in fact different. The SSL is resolved at the Elastic Load Balancer and a non-SSL request is sent to the web app. The expected CSRF token is stored in the cookie-based session, so the sessions for HTTP and HTTPS appear to expect different tokens. When using HTTP on the site, the post/put

Why do I get [SSL: CERTIFICATE_VERIFY_FAILED] in Python when ssl setup looks OK?

有些话、适合烂在心里 提交于 2021-02-08 05:23:25
问题 I'm working on a Python app to comunicate with a service running on localhost via secure websocket protocol. Here is a sample code: import json import asyncio import websockets import ssl import certifi ssl_context = ssl.create_default_context() ssl_context.load_verify_locations(certifi.where()) ssl_context.load_default_certs() query = { "jsonrpc": "2.0", "method": "queryHeadsets", "params": {}, "id": 1 } json = json.dumps(query) async def query(json): async with websockets.connect("wss:/

SSL options in gocql

萝らか妹 提交于 2021-02-08 05:16:04
问题 In my Cassandra config I have enabled user authentication and connect with cqlsh over ssl. I'm having trouble implementing the same with gocql, following is my code: cluster := gocql.NewCluster("127.0.0.1") cluster.Authenticator = gocql.PasswordAuthenticator{ Username: "myuser", Password: "mypassword", } cluster.SslOpts = &gocql.SslOptions { CertPath: "/path/to/cert.pem", } When I try to connect I get following error: gocql: unable to create session: connectionpool: unable to load X509 key