wolfCLU now properly handles #X509 name parsing after changes to wolfSSL’s OBJ_sn2nid behavior! This ensures reliable DN processing while maintaining backward compatibility. Upgrade for improved #OpenSSL compatibility!
Learn more: www.wolfssl.com/fix-...
#CommandLineUtility
Learn more: www.wolfssl.com/fix-...
#CommandLineUtility
Fix for change to OBJ sn2nid behavior in wolfCLU
This PR updates wolfCLU to properly handle X509 name parsing following changes in wolfSSL's OBJ_sn2nid function behavior. The changes focus on how Distinguished Name (DN) components are processed when creating X509 certificates.
These changes ensure wolfCLU properly handles X509 name components whe
www.wolfssl.com
February 28, 2025 at 11:06 PM
Everybody can reply
📌 Smuggling Executables Inside X.509 Certificates: A Novel Attack Vector https://www.cyberhub.blog/article/10508-smuggling-executables-inside-x509-certificates-a-novel-attack-vector
Smuggling Executables Inside X.509 Certificates: A Novel Attack Vector
A recent proof of concept (PoC) demonstrates a novel attack vector where an attacker embeds a complete Windows executable within an extension of an X.509 certificate. This technique leverages the trusted nature of HTTPS and certificates to deliver malicious payloads without traditional download mechanisms or HTTP requests. The attack involves the client retrieving the certificate via HTTPS, extracting the embedded executable, and running it locally. However, the effectiveness of this attack is limited by the presence of SSL inspection proxies, which replace the server's certificate with their own, thereby stripping out any non-standard extensions, including the malicious payload. This technique underscores the importance of SSL inspection and the need to monitor and validate certificate extensions. It highlights the creativity of attackers in finding new ways to smuggle malicious payloads and the necessity for robust security controls to mitigate such threats. Cybersecurity professionals should be aware of this technique and ensure that their defenses include SSL inspection and thorough certificate validation.
www.cyberhub.blog
July 27, 2025 at 8:20 PM
Everybody can reply
Go 1.22.1 and 1.21.8 are released!
Security: Includes security fixes for crypto/x509, html/template, net/http, net/http/cookiejar, and net/mail.
Announcement: groups.google.com/g/golang-ann...
Download: go.dev/dl/#go1.22.1 #golang
Security: Includes security fixes for crypto/x509, html/template, net/http, net/http/cookiejar, and net/mail.
Announcement: groups.google.com/g/golang-ann...
Download: go.dev/dl/#go1.22.1 #golang
All releases - The Go Programming Language
go.dev
March 9, 2024 at 9:36 AM
Everybody can reply
2 reposts
7 likes
#Windows "Click-Once" variant of #OpenLink #X509 Cert. Generator. Making #WebID on Windows totally painless :-) https://twitpic.com/25v8p5
November 20, 2024 at 10:29 PM
Everybody can reply
📦 lsnepomuceno/laravel-a1-pdf-sign 1.4.0
Sign PDF files with valid x509 certificates
🔗 https://github.com/lsnepomuceno/laravel-a1-pdf-sign
Sign PDF files with valid x509 certificates
🔗 https://github.com/lsnepomuceno/laravel-a1-pdf-sign
March 22, 2025 at 7:01 PM
Everybody can reply
it's an interesting problem, as far as i know x509 only allows for one root issuer so i don't think it supports some sort of crowdsourced verification. letsencrypt is free and pretty much used everywhere, hopefully it stays that way
April 28, 2025 at 2:01 AM
Everybody can reply
1 likes
#Firefox presents available #X509 certs (imported from #pkcs12 file) when challenged by #ODS. #WebID #llinkeddata https://twitpic.com/266gd6
November 20, 2024 at 10:30 PM
Everybody can reply
software falls sort of imagined requirement; film at 11
(x509 EV certs is what fits your imagination)
(x509 EV certs is what fits your imagination)
Bluesky's use of domains to verify users has led to cybersquatting and impersonation, as domains don't offer enough social proof for the average person (Ernie Smith/Tedium)
Main Link | Techmeme Permalink
Main Link | Techmeme Permalink
December 18, 2024 at 6:35 AM
Everybody can reply
#Firefox approving my #ODS server's #X509 certificate (normal server #SSL auth). #WebID #llinkeddata https://twitpic.com/266enj
November 20, 2024 at 10:30 PM
Everybody can reply
Data diffusion, integrity, and broken hierarchical CA network: . #WebID #LinkedData #SemanticWeb #Web30 #X509 #TLS
November 21, 2024 at 2:02 AM
Everybody can reply
I need a self-signed certificate for Reasons (Gemini) but for no reason at all, openssl absolutely refuses to give me a certificate. At all. With `openssl req -x509 ...` it gives me no cert.pem, and `-verbose` indicates it generates the key but it never mentions the certificate. With `openssl […]
Original post on infosec.town
infosec.town
October 6, 2024 at 5:16 PM
Everybody can reply
Originally from: TrustedSec: Attacking JWT using X509 Certificates ( :-{ı▓ #trustedsec #pentesting #cyberresearch
Attacking JWT using X509 Certificates
While pulling together some information for a previous blog, I had identified an interesting JSON Web Signature (JWS) header that I wanted to learn more about. In RFC 7515 Section 4.1, a list of registered header…
trustedsec.com
June 17, 2025 at 1:36 PM
Everybody can reply
There should be a Special Victims Unit for x509 crimes.
June 3, 2025 at 11:02 PM
Everybody can reply
ID: CVE-2025-24956
CVSS V4.0: MEDIUM
A vulnerability has been identified in OpenV2G (All versions < V0.9.6). The OpenV2G EXI parsing feature is missing a length check when parsing X509 serial numbers. Thus, an attacker could introduce a buffer overflow that leads...
#security #infosec #cve-alert
CVSS V4.0: MEDIUM
A vulnerability has been identified in OpenV2G (All versions < V0.9.6). The OpenV2G EXI parsing feature is missing a length check when parsing X509 serial numbers. Thus, an attacker could introduce a buffer overflow that leads...
#security #infosec #cve-alert
nvd.nist.gov
February 11, 2025 at 11:16 AM
Everybody can reply
We need to submit a new X509 extension for drone stuff; -)
November 15, 2024 at 1:01 AM
Everybody can reply
1 likes
woohoo... my x509 library works... just need to fine tune it some more
May 23, 2025 at 7:25 AM
Everybody can reply
#strongSwan 6.0.0 has been released ( #IPsec / #VPN / #IKE / #IKEv1 / #IKEv2 / #PostQuantumIKEv2 / #PostQuantumEncryption / #PostQuantum / #X509 / #FreeSWAN ) strongswan.org
strongSwan - IPsec VPN for Linux, Android, FreeBSD, macOS, Windows
strongSwan is an open-source, modular and portable IPsec-based VPN solution
strongswan.org
December 4, 2024 at 6:06 AM
Everybody can reply
"Unlocking the power of Azure IoT with private PKI x509 certificates" https://techcommunity.microsoft.com/discussions/Marketplace-Blog/unlocking-the-power-of-azure-iot-with-private-pki-x509-certificates/4357973 #Microsoft #techcommunity
Unlocking the power of Azure IoT with private PKI x509 certificates | Microsoft Community Hub
In this guest blog post, Sukhyung Shin, Senior IoT Solutions Architect - Strategy, Keyfactor, discusses how Azure IoT Hub and IoT Hub DPS can employ public...
techcommunity.microsoft.com
December 18, 2024 at 2:20 PM
Everybody can reply
🥳 Go 1.23.5 and 1.22.11 are released!
🔏 Security: Includes security fixes for CVE-2024-45336 and CVE-2024-45341 in crypto/x509 and net/http
🔈 Announcement: groups.google.com/g/golang-ann...
⬇️ Download: go.dev/dl/#go1.23.5
🔏 Security: Includes security fixes for CVE-2024-45336 and CVE-2024-45341 in crypto/x509 and net/http
🔈 Announcement: groups.google.com/g/golang-ann...
⬇️ Download: go.dev/dl/#go1.23.5
January 16, 2025 at 10:15 PM
Everybody can reply
15 reposts
77 likes
#WebID-s r typically generated by Personal #DataSpace Platforms (#pdsp). 1 WebID can be assoc. with several #X509 certs. #linkeddata
November 20, 2024 at 10:25 PM
Everybody can reply
step-cli 0.28.7-1 x86_64 A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.
Interest | Match | Feed
Interest | Match | Feed
Origin
archlinux.org
July 17, 2025 at 8:32 PM
Everybody can reply
i ran into a funny issue today where on my mac `openssl x509` won't parse a certificate unless every line in the file is 64 characters or less
November 4, 2024 at 8:54 AM
Everybody can reply