-
device are often on a closed network with out access to the general internet.
does this make it hard to validate certificates?
C-ITS has some of the same challenge, perhaps there is prio art in e.g. …
-
- Type: Bug
- Priority: Minor
**OS:** System independent
**mbed TLS build:** 552754a6ee82bab25d1bdf28c8261a4518e65e4d
If the subject DN have multiple RDNs with the same name, the mbedtls API…
-
## Attestation Background
Attestation is a method for verifying the integrity of a computer’s software, hardware, and firmware using a Trusted Platform Module (TPM). The TPM creates cryptographic m…
-
I already added a comment about this issue at https://github.com/Azure/iotedge/issues/6579#issuecomment-1295277467. I was asked to open an issue. I think it fits more here on this project.
**Infra…
-
>>>>> On Thu, 25 Sep 2014 11:32:41 -0400, Ron Monzillo said:
RM> In addition to the attributes currently required to be supported
RM> when a request has been received over a secure protocol, consider…
-
Certificate signing requests also feature other attributes than Extensions.
There are protocols like [RFC 7030: Enrollment over Secure Transport (EST)](https://www.rfc-editor.org/rfc/rfc7030.html) …
-
Hi,
So basically, I have run the ssi-hub server and switchboard-dapp on the localhost on their respective ports. Now, I am trying to connect the switchboard dapp with the cache server. I am editing…
-
# OpenSearch inbuilt security request for comments
This document proposes to build an inbuilt security module within OpenSearch core that enforces authentication, auditing and encryption-in-transit…
-
To Whom it May Concern,
Please see Adobe’s comments to the 2017 Report to the President on Federal IT Modernization.
Thanks for considering.
V/r,
Matt
Matt Schrader
Dir…
-
I want to remove security onion and install a fresh server running elastic stack, which will employ Zeek and Suricata. Zeek will process traffic from our SPAN port which mirrors traffic from our victi…