x509

Can not pull docker image from private repo when using Minikube

☆樱花仙子☆ 提交于 2019-12-03 02:57:54
I am attempting to use Minikube for local kubernetes development. I have set up my docker environment to use the docker daemon running in the provided Minikube VM (boot2docker) as suggested: eval $(minikube docker-env) It sets up these environment variables: export DOCKER_TLS_VERIFY="1" export DOCKER_HOST="tcp://192.168.99.100:2376" export DOCKER_CERT_PATH="/home/jasonwhite/.minikube/certs" When I attempt to pull an image from our private docker repository: docker pull oururl.com:5000/myimage:v1 I get this error: Error response from daemon: Get https://oururl.com:5000/v1/_ping: x509:

Could not parse certificate: java.io.IOException: Empty input X509Certificate

夙愿已清 提交于 2019-12-02 22:47:10
I am getting the error given below when parsing the signature. Anybody has idea why the error is showing? Note that: Using the same certificate I signed my own XML and verified which is working fine. That mean there is no issue with certificate. Client provided signed document not able to validate. Errors: Exception in thread "main" javax.xml.crypto.MarshalException: Cannot create X509Certificate at org.jcp.xml.dsig.internal.dom.DOMX509Data.unmarshalX509Certificate(DOMX509Data.java:225) at org.jcp.xml.dsig.internal.dom.DOMX509Data.<init>(DOMX509Data.java:116) at org.jcp.xml.dsig.internal.dom

Where to get Certificate for digitally signing PDFs?

自古美人都是妖i 提交于 2019-12-02 20:28:18
I'm working on a Java application that uses iText to digitally sign PDFs that will be made available online. I have been able to sign the documents with a test cert I obtained from GlobalSign and it works great. The test cert is part of GlobalSign's "DocumentSign for Adobe PDF". The reason I had to use this cert is so that my cert chains back to the Adobe Root CA, which to my knowledge (and I could be wrong) is the only CA that is trusted by Adobe Reader out of the box. I tried regular SSL certs from VeriSign and Entrust but they didn't work as they were not trusted. Now I need to get a

What strings are allowed in the “common name” attribute in an X.509 certificate?

馋奶兔 提交于 2019-12-02 20:09:59
In the common name field of the DN of a X509 certificate, as defined in ASN.1 notation for OID "2.5.4.3", what are the allowed values? I know that the limit is up to 64 characters, but are all characters allowed? Digits? E.g. are . s allowed? Is an IP address (x.x.x.x) a valid sequence per the ASN definition? Is a domain name allowed? The common name attribute in a Distinguished Name is encoded as: X520CommonName ::= CHOICE { teletexString TeletexString (SIZE (1..ub-common-name)), printableString PrintableString (SIZE (1..ub-common-name)), universalString UniversalString (SIZE (1..ub-common

How to verify a X509 certificate in C

白昼怎懂夜的黑 提交于 2019-12-02 18:37:13
I have a certificate in X509 format. this a input parameters in a function. What I would like to do is to verify the validity of the certificate. How can it be done? X509_verify_cert(); I found this function, but this does not accept a X509* certificate, it accepts X509_store and I only have a X509. Thanks best regards. doptimusprime See the documentation here . You need to create a certificate store using X509_STORE_CTX_new. Then add certificate chain using X509_STORE_CTX_set_chain. Add trusted root certificate using X509_STORE_CTX_trusted_stack. Finally add certificate to be verified using

OpenSSL Version V3 with Subject Alternative Name

烂漫一生 提交于 2019-12-02 18:14:10
I'm using the OpenSSL command line tool to generate a self signed certificate. It seems to be working correctly except for two issues. I can't get it to create a .cer with a Subject Alternative Name (critical) and I haven't been able to figure out how to create a cert that is Version 3 (not sure if this is critical yet but would prefer learning how to set the version). Has anyone done this successfully? The default config (.cfg) file has seemingly clear documentation (seen below): " This stuff is for subjectAltName and issuerAltname. Import the email address. subjectAltName=email:copy "

OpenSSL as a CA without touching the certs/crl/index/etc environment

久未见 提交于 2019-12-02 17:57:58
I think I have the right OpenSSL command to sign a certificate but I've gotten stuck and the tutorials I've found use a different argument format (I'm using OpenSSL 0.9.8o 01 Jun 2010). openssl ca -cert cert.pem -keyfile key.pem (Private key is not encryped and CSR is on stdin.) It gives this error Using configuration from /usr/lib/ssl/openssl.cnf ./demoCA/index.txt: No such file or directory unable to open './demoCA/index.txt' Looking at that configuration file: [ ca ] default_ca = CA_default # The default ca section [ CA_default ] dir = ./demoCA # Where everything is kept certs = $dir/certs

Why use an x.509 certificate to encrypt xml? Why not just transmit over https?

自作多情 提交于 2019-12-02 13:10:11
问题 Don't know much about encryption... Say I'm preparing a SAML request to submit to an identity provider. Why would I need to apply an x.509 certificate to this request? Is transmission over SSL alone not secure enough? 回答1: Yes - SSL is enough - but SSL is only point-to-point. You cannot secure your connection using SSL if there are a few intermediaries in the way between your source and your target machine. In that case, e.g. when transmitting over the internet, you must safeguard the actual

How to mimic browser X509 client certificate verification without access to HTTP layer

牧云@^-^@ 提交于 2019-12-02 09:03:16
问题 I was reading this article on authentication via a X509 client certificate, but I won't be able to get the server to request a client certificate as I'm running the application on Heroku, so I've no access to the HTTP layer. I saw a response to a similar question on Stackoverflow that said to use custom headers. I would like to mimic the client certificate verification with an application server using custom headers. I'm using Ruby, so if anyone knows of a library that already accomplishes

How to mimic browser X509 client certificate verification without access to HTTP layer

大兔子大兔子 提交于 2019-12-02 04:16:05
I was reading this article on authentication via a X509 client certificate , but I won't be able to get the server to request a client certificate as I'm running the application on Heroku, so I've no access to the HTTP layer. I saw a response to a similar question on Stackoverflow that said to use custom headers. I would like to mimic the client certificate verification with an application server using custom headers. I'm using Ruby, so if anyone knows of a library that already accomplishes this task, that would be helpful. Otherwise, is it possible and what are the resources I will need? I