• Breaking News

    Friday, September 20, 2019

    CVE-2019-6145 - Forcepoint VPN Client - Unquoted Search Path and Potential Abuses Security News & Discussion

    CVE-2019-6145 - Forcepoint VPN Client - Unquoted Search Path and Potential Abuses Security News & Discussion


    CVE-2019-6145 - Forcepoint VPN Client - Unquoted Search Path and Potential Abuses

    Posted: 20 Sep 2019 06:57 AM PDT

    Automating Exploitation of a Pulse SSL VPN Arbitrary File Read Vulnerability

    Posted: 20 Sep 2019 09:26 AM PDT

    SASTGriper: Finding vulnerable Code via grep. Need Feedback and suggestions!

    Posted: 20 Sep 2019 01:04 PM PDT

    Race Condition that could Result to RCE - (A story with an App that temporary stored an uploaded…

    Posted: 20 Sep 2019 04:26 AM PDT

    Run your own private CA & ACME server using step-ca

    Posted: 19 Sep 2019 10:27 AM PDT

    We just added ACME support to step-ca, an open source private certificate authority that I work on. ACME is the protocol that Let's Encrypt uses to automate certificate management for websites.

    ACME support in step-ca
    means you can leverage existing ACME clients and libraries to get certificates from your own private certificate authority (CA). This is particularly useful for:

    • Using ACME in production to issue certificates to workloads, proxies, queues, databases, etc. so you can use mutual TLS for authentication & encryption.
    • Simulating Let's Encrypt's CA in dev & pre-production in scenarios where connecting to Let's Encrypt's staging server is problematic.

    We're supporting the http-01 and dns-01 challenge types, so you should be able to get certs using any ACMEv2 client that supports one of these (most do).

    We've been working on this for a while so we're psyched to release it and see how people use it! Let us know what you think!

    submitted by /u/kagvaBwIcfpi
    [link] [comments]

    No comments:

    Post a Comment