#16 Implement Certificate Fingerprinting

开启中
stan4 年之前创建 · 1 条评论

We should have the VEN print their own certificate's fingerprint on startup (if a certificate is provided), which can be shared with the VTN to identify the VEN.

From the OpenADR documentation:

import ssl, hashlib
bin_cert = ssl.PEM_cert_to_DER_cert( open('client_cert.pem').read() )
sha_hash = hashlib.sha256(bin_cert).digest()
print ':'.join( '%02X' % ord(c) for c in sha_hash[-10:])
We should have the VEN print their own certificate's fingerprint on startup (if a certificate is provided), which can be shared with the VTN to identify the VEN. From the OpenADR documentation: ```python import ssl, hashlib bin_cert = ssl.PEM_cert_to_DER_cert( open('client_cert.pem').read() ) sha_hash = hashlib.sha256(bin_cert).digest() print ':'.join( '%02X' % ord(c) for c in sha_hash[-10:]) ```
Stan Janssen 评论于 4 年之前
所有者

This also means that the opposing party should be able to use the certificate fingerprint (instead of the certificate itself) to authenticate the incoming messages.

This also means that the opposing party should be able to use the certificate fingerprint (instead of the certificate itself) to authenticate the incoming messages.
登录 并参与到对话中。
未选择标签
未选择里程碑
未指派成员
1 名参与者
正在加载...
取消
保存
这个人很懒,什么都没留下。