-
# Checklist
* [x] I have read the relevant section in the
[contribution guide](http://docs.celeryproject.org/en/latest/contributing.html#other-bugs)
on reporting bugs.
* [x] I have checked th…
-
The Robovac 30C (and presumably future models) back off onto Tuya for command and control of the devices. The Eufy integration also uses a new (or custom) URL signing mechanism for Tuya cloud APIs. Al…
-
As RunDeck only accepts SSH keys generated with "RSA" alg, newer openssh server are not accepting it anymore by default.
Which means that, when you update a SSH server to a newer version the config…
-
First question: Are we absolutely sure we want to go down the public key cryptography route? (i.e. a project will sign and commit its signature file, which anyone can verify but not anyone can forge)?…
-
It looks like there is some problem with ssh agent when I try to login with nistp521 auth key on my Nitrokey Storage
I am able to login with Android password store that directly uses OpenKeychain, bu…
-
## CVE-2023-33201 - Medium Severity Vulnerability
Vulnerable Library - bcprov-jdk15on-1.69.jar
The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contain…
-
**Due diligence**
#2140 appers to result in the same behavior
**Describe the bug**
Attempting an SSH connection results in the following error: Unknown exception: q must be exactly 160, 224, or 2…
-
To protect against ARP poisoning and other attacks against NDP functions, Secure Neighbor Discovery (SEND) Protocol should be deployed where preventing access to the broadcast segment might not be pos…
-
## Steps to Reproduce
1. build Mono for netcore
2. make run-tests-corefx-System.Security.Cryptography.Pkcs.Tests
3.
### Current Behavior
The tests fail occasionally with NRE, for me locall…
-
Some processors do not have hardware division, and therefore the compiler generates code using other operations (additions, multiplications, shifts) for division by a constant, and calling a toolchain…