Does a DDOS attack on an application using CDN have to first bring down all the involved CDN servers to affect the application’s availability?

CDN are said to absorb and mitigate the Denial of Service and DDOS attacks. Consider an application that uses a CDN provider to deliver its content. So if an attacker tries to bring down such an application using DOS or DDOS,… Continue reading Does a DDOS attack on an application using CDN have to first bring down all the involved CDN servers to affect the application’s availability?

How can I limit which key sizes and signature algorithm of the next certificate in the certificate chain are allowed?

I have walked through the different fields of x509 certificates and came across some fields which enable to limit the usage of the certificate (for example for certain domains). Is it possible to limit which public key size… Continue reading How can I limit which key sizes and signature algorithm of the next certificate in the certificate chain are allowed?

How can I limit which key sizes and signature algorithm of the next certificate in the certificate chain are allowed?

I have walked through the different fields of x509 certificates and came across some fields which enable to limit the usage of the certificate (for example for certain domains). Is it possible to limit which public key size… Continue reading How can I limit which key sizes and signature algorithm of the next certificate in the certificate chain are allowed?