#16 Implement Certificate Fingerprinting

開啟中
stan4 年之前創建 · 1 條評論

We should have the VEN print their own certificate's fingerprint on startup (if a certificate is provided), which can be shared with the VTN to identify the VEN.

From the OpenADR documentation:

import ssl, hashlib
bin_cert = ssl.PEM_cert_to_DER_cert( open('client_cert.pem').read() )
sha_hash = hashlib.sha256(bin_cert).digest()
print ':'.join( '%02X' % ord(c) for c in sha_hash[-10:])
We should have the VEN print their own certificate's fingerprint on startup (if a certificate is provided), which can be shared with the VTN to identify the VEN. From the OpenADR documentation: ```python import ssl, hashlib bin_cert = ssl.PEM_cert_to_DER_cert( open('client_cert.pem').read() ) sha_hash = hashlib.sha256(bin_cert).digest() print ':'.join( '%02X' % ord(c) for c in sha_hash[-10:]) ```
Stan Janssen 評論 4 年之前'
所有者

This also means that the opposing party should be able to use the certificate fingerprint (instead of the certificate itself) to authenticate the incoming messages.

This also means that the opposing party should be able to use the certificate fingerprint (instead of the certificate itself) to authenticate the incoming messages.
登入 才能加入這對話。
未選擇標籤
未選擇里程碑
未指派成員
1 參與者
正在加載...
取消
保存
尚未有任何內容