Is it a security risk to put MAC-adresses in a TLS certifcate common name? [closed]

I am working on a project where I am port scanning the full IPv4 address space globally and analysing the banner behind the hosts (services, software versions etc.). For some hosts I found TLS certificates that have MAC addresses in the co… Continue reading Is it a security risk to put MAC-adresses in a TLS certifcate common name? [closed]

What happens to the key pair once the CSR has been enrolled?

I have a key pair which I used to generate a CSR.
Once I enrolled that CSR PKCS10, I get from the PKI (or CA) a certificate signed with the PKI private key.
From here, I would like to know if my private key is useful in any way in regards … Continue reading What happens to the key pair once the CSR has been enrolled?

Is a Certificate Signing Request a concatenation of public key and metadata?

From this question, it is said that when creating a CSR, we attach the public key and fill in other data.

When creating a CSR, you attach your public key to it and fill in other needed data; you then send it to a Certificate Authority (CA… Continue reading Is a Certificate Signing Request a concatenation of public key and metadata?

WebAuthn does not guarantee public-key integrity other than trough attestation?

I’ve been reading about WebAuthn and try to write some code to exercise.
One thing I noticed is that the spec doesn’t seem to provide any way to verify the correctness of the public-key being create()’d other than through attestation. And … Continue reading WebAuthn does not guarantee public-key integrity other than trough attestation?