-
https://github.com/google/certificate-transparency-go/tree/master/trillian/migrillian
Locally copying the contents of CT logs for experimentation and playing is a thing which comes up quite frequen…
-
Folks,
Got this in the most recent Fiesty Duck TLS news from the folks at SSLabs:
> Peter Bowen from Amazon developed the tool certlint to check for several common errors in X.509 certificates. The …
-
We should do a search in certificate transparency logs before doing the bruteforce search, would be something like this:
```bash
curl "https://crt.sh?q=nmap.org&output=json" | jq ".[].common_name"…
-
Hello
Please can you add your [Python certificate transparency log client](https://github.com/google/certificate-transparency/tree/master/python/ct/client) to [PyPI (the Python Package Index)](http…
-
In following up on https://bugzilla.mozilla.org/show_bug.cgi?id=1838667 and https://www.agwa.name/blog/post/last_weeks_lets_encrypt_downtime, I'd like to try contributing a configurable lint that chec…
-
The current Neon onboarding starts by a suggestion to import my data. Yet as far as I can see, all of the current Neon documentation guides developers to use unencrypted connections.
I see from the…
-
RFC 6962 section 3.5 (https://tools.ietf.org/html/rfc6962#section-3.5) says:
> Each log MUST produce on demand a Signed Tree Head that is no older
> than the Maximum Merge Delay.
Looking at the pyth…
-
**Description**
With cosign 2, when verifying a signature in the transparency logs, an OIDC issuer and subject must be matched, but there's very little guidance as to what the options are. The err…
-
### Mozilla Bugzilla Root Inclusion URL
https://ccadb.my.site.com/001o000000HsfpCAAR
### CA CP/CPS Website URL
https://www.izenpe.eus/contenidos/informacion/doc_juridica/en_def/adjuntos/IZNP_CP_Web…
-
A [recent update in python-certify](https://github.com/freedomofpress/dangerzone/pull/859) made me think about how this could affect us, and if/how this could be handled differently.
## The problem…
almet updated
3 months ago