-
**Reporter: dmorissette**
**Date: 2006/05/30 - 17:29**
```
This bug is to track the implementation of RFC-18 in MapServer 4.9. From the RFC:
------------------------
Overview
--------
This proposa…
-
## Introduction
Hi! I love this project idea and really appreciate the dedication to modern security standards (such as DKIM support) as well as `mail-send`'s RFC compliance. The current feature se…
-
### Description
- Type: Feature Request
- Priority: Minor
## Enhancement\Feature Request
Add support for the new ciphersuites with ECDHE-PSK key exchange and AEAD encryption from [RFC 8442](ht…
-
Hi,
During testing commit 841c8228, we discovered that the PQUIC server does not discard the unused encryption keys after moving to a new encryption level.
The unused encryption keys, such as th…
-
Currently plan files persisted in workplace artifacts in GitHub are not encrypted (see #817). This is a security concern because plan artifacts contain a snapshot of state, which can contain sensitive…
-
I'd love to see support for RFC-8037 (JWS/JWT specifically with Ed25519 via PyNaCl) and RFC-7539 (JWE using ChaCha20/Poly1305 encryption) in here.
- Regarding RFC-8037, there seems to be a PR #100 …
-
Dear @Thalhammer
Thanks for this useful library and recent changes are wonderful, we can use the json library like simdjson or rapidjson for performance point of view
Since you develop this jwt…
-
PR's https://github.com/docker/cli/pull/1501 / https://github.com/docker/cli/pull/1500 added support for TLS config using encryption as specified in RFC 1423, however, that functionality has been dep…
-
### What happened?
I am a member of a group investigating automated testing of QUIC protocol implementations. During our tests involving a XQUIC implementation with the commit version 00f62288, w…
-
### Specification
Our current encryption/decryption layer sits on top of LevelDB. This causes problems for indexing #1 because when you want ot index something you'll need to expose keys, and keys …