-
Andrew Ayer
Andrew Ayer
January 24, 2017
Sebastian Krahmer of the SUSE Security Team has discovered a local root exploit in systemd v228. A local user on a system running systemd v228 can escalate to root privi...
-
Blog
June 2023The Story Behind Last Week's Let's Encrypt Downtime[1]The Difference Between Root Certificate Authorities, Intermediates, and Resellers[2]January 2023The SSL Certificate Issuer Field is a Lie...
-
Writing an SNI Proxy in 115 Lines of Go
Writing an SNI Proxy in 115 Lines of Go
The very first message sent in a TLS connection is the Client Hello
record, in which the client greets the server and tells it, among other
things, the server ...
-
Blog - Andrew Ayer
Andrew Ayer
Last Thursday (June 15th, 2023), Let's Encrypt went down for about
an hour, during which time it was not possible to obtain certificates
from Let's Encrypt. Immediately prior to the outa...
-
It's Now Possible To Sign Arbitrary Data With Your SSH Keys
It's Now Possible To Sign Arbitrary Data With Your SSH Keys
Did you know that you can use the
ssh-keygen command to sign and verify signatures on
arbitrary data, like files and software releases? ...
-
git-crypt - transparent file encryption in git
git-crypt - transparent file encryption in git
git-crypt enables transparent encryption and decryption of files in a git repository. Files which you choose to protect are encrypted when committed, an...