Skip to content
#

pki

Here are 408 public repositories matching this topic...

certificates
tashian
tashian commented Jan 10, 2022

The recommendation is to set Cache-Control: private, no-store on any endpoint with sensitive information. Because while you can protect the traffic with TLS, you also need to keep sensitive information out of a client's (unencrypted) HTTP cache. I'm not sure how relevant this is to the API context of step-ca though—I've never seen an HTTP client library that caches content. But I guess the poi

AutomatedLab is a provisioning solution and framework that lets you deploy complex labs on HyperV and Azure with simple PowerShell scripts. It supports all Windows operating systems from 2008 R2 to 2019, some Linux distributions and various products like AD, Exchange, PKI, IIS, etc.

  • Updated May 25, 2022
  • PowerShell
vqhuy
vqhuy commented Aug 4, 2017

During our last meeting, we discussed how should the server/the client compute the commitment:

  • Main concern: server is using a static salt which would allow an attacker to test whether keys exist in the tree
    => client sends salt along with the registration
    => need secure PRNG

  • How to ensure the server is using the right commitment scheme? Client should verify with the scheme specified

Improve this page

Add a description, image, and links to the pki topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the pki topic, visit your repo's landing page and select "manage topics."

Learn more