ssl

SSL tunnel with Boost::Beast

ぃ、小莉子 提交于 2021-02-09 09:57:01
问题 I want to connect to a proxy server that only allows HTTP connections, to speak with the target server by HTTPS. The proxy server documentation states that the only way to do that is by means of the HTTP Connect verb (they are planning to add direct HTTPS connections to the proxy server itself, but for the moment only HTTP connections are allowed). In my C++ program, I successfully connected and worked with the target server using ssl_stream 's during a couple of months, using boost::asio

SSL tunnel with Boost::Beast

﹥>﹥吖頭↗ 提交于 2021-02-09 09:56:18
问题 I want to connect to a proxy server that only allows HTTP connections, to speak with the target server by HTTPS. The proxy server documentation states that the only way to do that is by means of the HTTP Connect verb (they are planning to add direct HTTPS connections to the proxy server itself, but for the moment only HTTP connections are allowed). In my C++ program, I successfully connected and worked with the target server using ssl_stream 's during a couple of months, using boost::asio

SSL Error “The message received was unexpected or badly formatted” for a .NET application on one specific machine only

若如初见. 提交于 2021-02-08 19:39:58
问题 I have a .NET Core 3.1 C# application which is calling an API via HTTPS (and presenting its public key as part of getting the token as that certificate is later used to decrypt information sent back separately). On just about all our machines, it is working, but on one Windows 8.1 machine, we get the following series of exceptions when we try to initially connect for an authentication token: The SSL connection could not be established, see inner exception. ---> System.Security.Authentication

SSL Error “The message received was unexpected or badly formatted” for a .NET application on one specific machine only

懵懂的女人 提交于 2021-02-08 19:37:49
问题 I have a .NET Core 3.1 C# application which is calling an API via HTTPS (and presenting its public key as part of getting the token as that certificate is later used to decrypt information sent back separately). On just about all our machines, it is working, but on one Windows 8.1 machine, we get the following series of exceptions when we try to initially connect for an authentication token: The SSL connection could not be established, see inner exception. ---> System.Security.Authentication

“No system CA bundle could be found” on Google App Engine on localhost

ぃ、小莉子 提交于 2021-02-08 12:53:06
问题 I'm working on an app that I'll be running in the Google App Engine (GAE) that needs to access the GDrive API. When it's running up in the cloud, I'm able to use my special domain-wide authorization so that my users are automatically authenticated and I can use the gdrive api without any problems. That works very well. However, when testing on localhost , the domain-wide auth won't work because we localhost doesn't actually authenticate your Google Account, you're just allowed to claim to be

Avoid sending TLS_EMPTY_RENEGOTIATION_INFO_SCSV cipher in TLS Client Hello

旧城冷巷雨未停 提交于 2021-02-08 12:34:07
问题 Node.js sends the TLS_EMPTY_RENEGOTIATION_INFO_SCSV cipher by default to protect itself against the POODLE attack. I'm trying to avoid sending this cipher (even though this may pose a security risk) by overriding the TLS ciphers with a custom list of ciphers. However, Node.js keeps sending the TLS_EMPTY_RENEGOTIATION_INFO_SCSV cipher no matter what I do. I'm trying to deliberately avoid sending this cipher to mimic the TLS negotiation of Firefox/Chrome. Here's the code I use to modify and

Getting SSL error while sending email, can't connect to Postfix

青春壹個敷衍的年華 提交于 2021-02-08 11:29:17
问题 var nodemailer = require('nodemailer'); var smtpTransport = require('nodemailer-smtp-transport'); var transport = nodemailer.createTransport(smtpTransport({ host: 'mail.mydomain.com', port: 587, secure: true, auth: { user: 'hello', pass: 'thepassword' } })); var mailOptions = { from: 'Tester <test@mydomain.com>', // sender address to: 'someemail@gmail.com', // list of receivers subject: 'Hello', // Subject line text: 'hey', // plaintext body html: 'hey' // html body }; transport.sendMail

Client authentication in server Tomcat

你离开我真会死。 提交于 2021-02-08 09:23:52
问题 i want to configure SSL for mutual authentication. I work with eclipse + tomcat 8. I do this passages: I created private keys in this way: openssl genrsa -des3 -out client_key.pem 2048 openssl genrsa -des3 -out server_key.pem 2048 I created self-signed certificates: openssl req -new -x509 -key client_key.pem -out client.pem -days 365 -config <path to>\openssl.cnf openssl req -new -x509 -key server_key.pem -out server.pem -days 365 -config <path to>\openssl.cnf I created truststore and import

Client authentication in server Tomcat

拥有回忆 提交于 2021-02-08 09:23:08
问题 i want to configure SSL for mutual authentication. I work with eclipse + tomcat 8. I do this passages: I created private keys in this way: openssl genrsa -des3 -out client_key.pem 2048 openssl genrsa -des3 -out server_key.pem 2048 I created self-signed certificates: openssl req -new -x509 -key client_key.pem -out client.pem -days 365 -config <path to>\openssl.cnf openssl req -new -x509 -key server_key.pem -out server.pem -days 365 -config <path to>\openssl.cnf I created truststore and import

How exactly TLS/SSL works regarding client certificate?

无人久伴 提交于 2021-02-08 08:23:20
问题 I read the TLS 1.2 RFC, but i couldn't find (or understand) how client certificate authentication works. What i understood is that the server may request the client certificate and the client should provide it, but what exactly does it provide? How does the client prove he owns the private key (I assume he gets some challenge and encrypts it, but what exactly does he encrypt)? I will be happy if someone could shed some light on this part of the protocol. EDIT : What i'm trying to achieve is