#16 Implement Certificate Fingerprinting

오픈
stan4 년 전을 오픈 · 1개의 코멘트
Stan Janssen 코멘트됨, 4 년 전

We should have the VEN print their own certificate's fingerprint on startup (if a certificate is provided), which can be shared with the VTN to identify the VEN.

From the OpenADR documentation:

import ssl, hashlib
bin_cert = ssl.PEM_cert_to_DER_cert( open('client_cert.pem').read() )
sha_hash = hashlib.sha256(bin_cert).digest()
print ':'.join( '%02X' % ord(c) for c in sha_hash[-10:])
We should have the VEN print their own certificate's fingerprint on startup (if a certificate is provided), which can be shared with the VTN to identify the VEN. From the OpenADR documentation: ```python import ssl, hashlib bin_cert = ssl.PEM_cert_to_DER_cert( open('client_cert.pem').read() ) sha_hash = hashlib.sha256(bin_cert).digest() print ':'.join( '%02X' % ord(c) for c in sha_hash[-10:]) ```
Stan Janssen 코멘트됨, 4 년 전
소유자

This also means that the opposing party should be able to use the certificate fingerprint (instead of the certificate itself) to authenticate the incoming messages.

This also means that the opposing party should be able to use the certificate fingerprint (instead of the certificate itself) to authenticate the incoming messages.
로그인하여 이 대화에 참여
레이블 없음
마일스톤 없음
담당자 없음
참여자 1명
로딩중...
취소
저장
아직 콘텐츠가 없습니다.