Oracle 11g Web control, some operations require host identification, such as data backup, data export import and so on;This provides a certain guarantee for the security of the database. If we have the proper configuration, we can encounter some errors for the first time:ORACLE11G Host Identity Certificate problemPlease check and correct the following error and retry the operation:Error: Invalid user name and/or passwordSo at this point we need to do
Digital Certificate and Its Application in Security Testing0x00 background
To perform security tests on the Web layer, it is inevitable that a man-in-the-middle proxy will be used to capture packets for analysis. Common tools include BurpSuit, Fiddker, and Charles. The usage of these tools has been described on the Internet. I will not go into details here. However, when testing websites with high security, you may encounter SSL communication problems
Handshake and communication over the SSL protocol
To better understand and understand the SSL protocol, we will introduce the handshake protocol of the SSL protocol. SSL uses both public key encryption and symmetric encryption. Although symmetric encryption is faster than public key encryption, public key encryption provides better identity authentication. The SSL handshake protocol is very effective for customers and servers to complete identity authentication. The main process is as follows:①
About this piece of content, in the online search post are older, see the post on the basic is Xcode6 before the iOS8 version of the age, for now more new iOS10.2 and Xcode 8.2来, knowledge points in the whole is still some not comprehensive, Just recently the project needs to do this piece of content, it is sorted out, convenient for later review.Development environmentHardware: MacBook Pro/iphone 7Software: OS 10.11.5/xcode 8.2.1/ios 10.2.1Certificate RequestIf you need to do a remote push, the
Do the real-time test, according to the online process, walked through, at that time did not pay attention to the meaning of various certificates. Now do message push, need a variety of certificates, APP ID information, in order to better understand the process, so collated the online certificate and other relevant information. Convenient for yourself and a friend in need.Content reference from: http://blog.csdn.net/hitwhylz/article/details/22989507ht
Do the real-time test, according to the online process, walked through, at that time did not pay attention to the meaning of various certificates. Now do message push, need a variety of certificates, APP ID information, in order to better understand the process, so collated the online certificate and other relevant information. Convenient for yourself and a friend in need.Content reference from: http://blog.csdn.net/hitwhylz/article/details/22989507ht
SSL protocol and digital certificate principles
1st Floor
Handshake and communication over the SSL protocolTo better understand and understand the SSL protocol, we will introduce the handshake protocol of the SSL protocol. SSL uses both public key encryption and symmetric encryption. Although symmetric encryption is faster than public key encryption, public key encryption provides better identity authentication. The SSL handshake protocol
The term "digital certificate" is believed to have been heard by many people, but it is not understood that "EJBCA" may not have been heard by many peopleDigital certificate (Certificate), is the Internet communication process in the identification of the identity of the communication of a document, can be understood as "network ID", the main purpose is to verify
Description of several format files:Csr--> the files generated on the F5. Contains the domain name, company name, department name, city, mailbox and other information.Crt/cer--> public key, certificate file, issued by an authoritative certificate authority.Key--> the private key, which is generated in pairs with the CSR.Cases:1_root_bundle.crt--> certificate chai
Certificate Services AppEnvironment: A single domain controller server 2008, one clientPurpose: Encrypt dataSteps:1. On the domain controller, in Administrative Tools, open Server Manager, select Roles, and click Add Roles.2. In the Select Server Roles window, select Active Directory Certificate Services, and then tap Next. :650) this.width=650; "Style=" background-image:none;border-bottom:0px;border-left:0
I. Theoretical knowledge
What is ca?
Ca is short for Certificate Authority. It is usually translated into an authentication authority or a certification center. It is mainly used to issue digital certificates to users. This digital certificate contains part of the user's identity information and the public key held by the user. At the same time, the private key of the CA is used to add a digital signature
One of the things faced by many network engineers is the maintenance and update of SSL certificates. For the author, SSL certificates are mainly used for VPN deployment, but there are also many network devices that need certificates to encrypt client-to-server communication. Every time I claim that I need a certificate, everyone will become speechless, and the certificate may be a bit scary for most people.
This feature is not commonly used, the general development of less related to the certificate, but it is necessary to understand briefly.First of all, the method of making the test certificate, here the old week to talk about two methods, you can generate a. pfx file for testing.To produce a certificate, everyone knows there is a makecert tool. OK, let's start wi
I. Introduction of OpenSSL
OpenSSL is currently the most popular SSL cipher library tool that provides a common, robust, and fully functional suite of tools to support the implementation of the SSL/TLS protocol.Official website: https://www.openssl.org/source/ component cipher algorithm library key and certificate encapsulation management function SSL Communication API Interface use establish RSA, DH, DSA key parameter establish the
Certificate formats-X.509, der and PEMPart: 1 2 3Certificate standard and File encodings seem to be confusing. I wrote down some notes about:
What is X.509 certificate standard?
PEM (privacy enhanced mail) Encoding
Der (distinguished encoding rules) Encoding
"Keytool" exporting certificates in der and PEM
"OpenSSL" verifying "keytool" Certificates
"OpenSSL" generating cert
[Slightly abridged] In order to achieve the popularity of the effect, I will try to use the more obvious, non-technical language to clear.★ First to say a popular exampleConsidering the knowledge of the certificate system is more dull and obscure. Let me start with a popular example. ◇ General Letter of introductionI suppose everyone has heard of the example of a referral? Suppose Mr. Zhang San of Company A is going to visit Company B, but everyone at
This is a tutorial from Raywenderlich, the content is informative! The structure is simple and thorough, the explanation is gradual, article quality is superior! It's a difficult blog post! Use half a bottle of English to translate a bit:1. Overview of "IOS Push full resolution" (i) push2. "IOS Push full resolution" (ii) Generate a push certificate, Generate provisioning profile (this article)3. "IOS Push full resolution" (iii) a minimalist demo and t
Using the Sogou browser to open an SSL-encrypted web site prompts "Revocation information for this site's security certificate is not available." Do you want to continue? " As shown in figure:
Solutions
Note: This method is only limited to avoid the hint, and do not guarantee the personal visit of the website problem, so we suggest that we still use the eye to identify whether the normal site. If you do not know the best to search the site
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.