-
Updated
May 16, 2022 - Shell
pki
Here are 419 public repositories matching this topic...
-
Updated
Jun 28, 2022 - Go
-
Updated
Jun 22, 2022 - PowerShell
-
Updated
Jun 14, 2022 - TypeScript
-
Updated
Jun 27, 2022 - Jinja
-
Updated
Apr 28, 2022
-
Updated
Jun 13, 2022 - Go
-
Updated
Jun 27, 2022 - Go
-
Updated
Jun 1, 2022 - Perl
-
Updated
May 30, 2022 - Java
-
Updated
Jun 24, 2022 - Go
-
Updated
Jun 28, 2022 - C
-
Updated
May 3, 2022 - Python
-
Updated
Sep 3, 2021 - PowerShell
-
Updated
May 20, 2022 - TypeScript
-
Updated
Jan 21, 2022 - C#
This issue was migrated from Pagure Issue #3199. Originally filed by rcritten (@rcritten) on 2020-08-03 15:59:52:
- Assigned to nobody
IPA can be installed in a CA-less configuration with the user providing the certificates required for operation. Running ipa-healthcheck with this will generate quite a few pk
-
Updated
May 24, 2022 - Go
-
Updated
May 8, 2021 - Go
-
Updated
Dec 14, 2021 - Shell
-
Updated
Jun 24, 2022 - Java
During our last meeting, we discussed how should the server/the client compute the commitment:
-
Main concern: server is using a static salt which would allow an attacker to test whether keys exist in the tree
=> client sends salt along with the registration
=> need secure PRNG -
How to ensure the server is using the right commitment scheme? Client should verify with the scheme specified
Improve this page
Add a description, image, and links to the pki topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the pki topic, visit your repo's landing page and select "manage topics."
The recommendation is to set
Cache-Control: private, no-storeon any endpoint with sensitive information. Because while you can protect the traffic with TLS, you also need to keep sensitive information out of a client's (unencrypted) HTTP cache. I'm not sure how relevant this is to the API context ofstep-cathough—I've never seen an HTTP client library that caches content. But I guess the poi