How do I remove a certificate from (RedHat) Linux ca-trust? [migrated]

I installed a duplicate certificate for a CN in the ca-trust store of my RHEL8 systems. I added the PEM file to /etc/pki/ca-trust/source/anchors and ran update-ca-trust.
How can I remove the certificate(s) that update-ca-trust installed? I… Continue reading How do I remove a certificate from (RedHat) Linux ca-trust? [migrated]

Is it possible to see HTTPS traffic without intercepting? (With a copy of the traffic) [duplicate]

I have a WAF solution that can work both inline and out-of-band. And we want to try the OOB option first. And possibly want to see HTTPS traffic as well.
But the vendor says if we want to see the HTTPS traffic, we should implement the solu… Continue reading Is it possible to see HTTPS traffic without intercepting? (With a copy of the traffic) [duplicate]

How to verify hostname of certificate? and Is it mandatory if client knows the certificate?

I have a reported finding saying that hostname verification is disabled.
This can be deduced from this line of code:
final HttpClientBuilder httpClientBuilder = HttpClientBuilder.create();
httpClientBuilder.setSSLContext(sslContext).se… Continue reading How to verify hostname of certificate? and Is it mandatory if client knows the certificate?

How can you protect against a man-in-the-middle forging a TLS Client Hello that offers insecure algorithms?

According to PAN-OS documentation for "Traceability and Control of Post-Quantum Cryptography",

Traffic encrypted by PQC [post-quantum computing] or hybrid PQC algorithms cannot be decrypted yet, making these algorithms vulnerabl… Continue reading How can you protect against a man-in-the-middle forging a TLS Client Hello that offers insecure algorithms?

In TLS, how are the Diffie-Hellman exchange parameters protected from a MITM attack? [duplicate]

Authentication alone will not stop a MITHM from intercepting and modifying plaintext exchanges, since he can let the authentication occur, then begin modifying the exchange data and neither end will sense anything wrong.
What am I missing … Continue reading In TLS, how are the Diffie-Hellman exchange parameters protected from a MITM attack? [duplicate]