To clarify the Windows crypto fail: The problem isn't in signature validation. The problem is the *root store/cache*. CryptoAPI considers an (attacker-supplied) root CA to be in the trust store if its public key and serial match a cert in the root store, Ignoring curve params.
Yeah, but as it's a fixed parameter in practice, it isn't *really* different from curve parameters for ECC. Which is interesting.
-
-
You mean in the sense that there are only a handful of normal values and anything else is very suspicious? Also, I just remembered this:https://github.com/saltstack/salt/commit/5dd304276ba5745ec21fc1e6686a0b28da29e6fc …
-
Yes; technically you can generate it but it's silly.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.