What are possible implications of ignoring the ssh host key warning?

With password authentication you’re basically giving your password to the attacker. At least that is my understanding. What about public key authentication? I hear that a private key never leaves your side, and that it’s not possible to pe… Continue reading What are possible implications of ignoring the ssh host key warning?

SSH Agent Forwarding – What are the best practices and current security issues?

Using agent forwarding comes with a risk, but stored private keys can also abused if the attacker has compromised the remote machine.
In this thread I want to discuss whether agent forwarding is safe to use or should not be used because of… Continue reading SSH Agent Forwarding – What are the best practices and current security issues?

Why my certificate does not have OCSP must-staple extension even when CSR contains it, is OCSP must-staple still used?

We received recently security report with [low] security issue: Missing "Must-Staple" extension on certificate.
With help of old article oscp-must-staple I managed to create CRA with extension.
Requested Extensions:
X509v3 Basi… Continue reading Why my certificate does not have OCSP must-staple extension even when CSR contains it, is OCSP must-staple still used?

Could a bad actor get hold of your credential sent via https if you are connect to their fake network?

Imagine this typical Fake WiFi scenario:
A bad actor creates a fake coffee shop Wifi and therefore is in full control of the network. An unsuspecting victim would connect to the Wifi and log in to their email password via an HTTPS website…. Continue reading Could a bad actor get hold of your credential sent via https if you are connect to their fake network?

Could having intermediate CA not installed to trust store be a vulnerability?

I’ve read through several articles and posts here and on other resources and I’m still confused.
Say I have a key pair, and I got a server certificate for my public key from some trusted CA. Now I’m generating fake certificate for some dom… Continue reading Could having intermediate CA not installed to trust store be a vulnerability?