2025å¹´8æ1æ¥ã«éå¬ããããJANOG56 Meeting éè¯LT BoFã®çºè¡¨è³æã§ãã
追è¨: ãã®å¾ã®åãã«ã¤ãã¦æ¸ãã¾ãã â Let's Encryptã®è¨¼ææ¸åæ¿å¨ããã®å¾ ãã®ãµã¤ãã¯Let's Encryptã§è¨¼ææ¸çºè¡ãã¦ããã®ã§ã¿ã¤ãã«ã®ä»¶ãæ°ã«ãªã£ãã®ã ããã©ãããã¾ã話é¡ã«ãªã£ã¦ããªããæ¥ããããªããSSLå¨ã詳ãããããããªãã®ã§ã誤ã£ã¦ããããç¥ããªããèè ã®æè¦ãæ±ãã Let's Encryptã使ããã¦ãããµã¤ããAndroid7.1以åã®ãã¼ã¸ã§ã³ã§ä»å¹´ã®9æ29æ¥ä»¥éè¦ãããªããªãå¯è½æ§ããã å»¶å½çã¯ç¨æããããã ãããããæ¥å¹´ã®9æ29æ¥ã¾ã§ Let's Encryptã®ã«ã¼ãè¨¼ææ¸åãæ¿ãè¨ç»ã«èµ·å ãã¦ãã Let's Encryptã®ã«ã¼ãè¨¼ææ¸ã®å¤æ´ Let's Encryptã¯ã«ã¼ãè¨¼ææ¸ãèªèº«(ISRG)ã®èªè¨¼å±ã®ã«ã¼ãè¨¼ææ¸(ISRG Root X1)ã«åãæ¿ãããã¨ãã¦ãããç¾å¨ã¯ãIdenTrustã®ã«ã¼ãè¨¼ææ¸(DST
ç¬è£æ¿æ²»ãç¶ãã«ã¶ãã¹ã¿ã³ã§ã¯ãæ¿åºãèªè¨¼ããã«ã¼ãè¨¼ææ¸ã®ã¤ã³ã¹ãã¼ã«ã彿°ã«å¼·å¶ããã¦ãã¾ãããã®ã«ã¼ãè¨¼ææ¸ãå°å ¥ãã¦ãã¾ãã¨HTTPSãããã³ã«ã®æå·åéä¿¡ãæ¿åºã«ååãããå¯è½æ§ããããã¨ããå¼·ãæ¹å¤ãåãã¦ãMozillaã¨Googleãã«ã¶ãã¹ã¿ã³æ¿åºã«ããã«ã¼ãè¨¼ææ¸ããããã¯ãããã¨ã表æãã¾ããã Google Online Security Blog: Protecting Chrome users in Kazakhstan https://security.googleblog.com/2019/08/protecting-chrome-users-in-kazakhstan.html Mozilla takes action to protect users in Kazakhstan - The Mozilla Blog https://blog.mozill
ä»å¾ãé彿¿åºãã¢ã¯ã»ã¹ãç¦æ¢ããéæ³ãããã¤ç©ãè³åãªã©ã®ã¦ã§ããµã¤ãï¼ï¼ï¼ãµã¤ãã«æ¥ç¶ãããã¨ããã¨ç»é¢ããã©ãã¯ã¢ã¦ãç¶æ ã«ãªããæ¾ééä¿¡å§å¡ä¼ã¯æ¾éé信審è°å§å¡ä¼ãé®æãæ±ºããæµ·å¤ã®éæ³ã¦ã§ããµã¤ãï¼ï¼ï¼ãµã¤ãã«å¯¾ããã¢ã¯ã»ã¹ãæ ¹æ¬ããå°ãè¾¼ããããã«ãã®ãããªæªç½®ãåãã¨ï¼ï¼æ¥ãæããã«ããã ä»åã®æªç½®ã¯ãã§ã«æ¿åºãåã£ã¦ããéæ³æå®³ãµã¤ãã®é®ææ¹å¼ã«æ¯ã¹ã¦å¼·åº¦ãé«ãããããã¾ã§æ¿åºã¯éæ³æå®³ãµã¤ãã®ã¤ã³ã¿ã¼ãããã¢ãã¬ã¹ï¼ï¼µï¼²ï¼¬ï¼ã鮿ããDNSï¼ãã¡ã¤ã³ã»ãã¼ã ã»ã·ã¹ãã ï¼ãå©ç¨ãã¦ãããã¦ã¼ã¶ã¼ãéæ³æå®³ãµã¤ãã®ã¢ãã¬ã¹ãå©ç¨ãã¦ã¢ã¯ã»ã¹ãããã¨ããã¨ãï¼·ï½ï½ï½ï½ï½ï½ãè¦åã¦ã£ã³ãã¦ãåºã¦ããããã«ãã¦ããã
.app 1 .dev 1 #11WeeksOfAndroid 13 #11WeeksOfAndroid Android TV 1 #Android11 3 #DevFest16 1 #DevFest17 1 #DevFest18 1 #DevFest19 1 #DevFest20 1 #DevFest21 1 #DevFest22 1 #DevFest23 1 #hack4jp 3 11 weeks of Android 2 A MESSAGE FROM OUR CEO 1 A/B Testing 1 A4A 4 Accelerator 6 Accessibility 1 accuracy 1 Actions on Google 16 Activation Atlas 1 address validation API 1 Addy Osmani 1 ADK 2 AdMob 32 Ads
Weâre pleased to announce that ACMEv2 and wildcard certificate support is live! With todayâs new features weâre continuing to break down barriers for HTTPS adoption across the Web by making it even easier for every website to get and manage certificates. ACMEv2 is an updated version of our ACME protocol which has gone through the IETF standards process, taking into account feedback from industry e
Takuya Digital crafts(man|dog). Love photography. Always making otherwise sleeping. born in 1984. Mac OSXãEl Capitanã«ãããChromeã§Twitterãªã©ãéããªã App StoreãéããªããããªããCPUãéå°ã«åãã¦ããããå°ãã¾ããã VeriSignã®SSLè¨¼ææ¸ãåå ä¼¼ããããªçç¶ã®äººã¯å¤ãã以ä¸ã®è¨äºã«æ¦ãã®è§£æ±ºæ¹æ³ã示ããã¦ãã¾ãã MacãOS X El Capitanã«ãããApp Storeã¨ãTwitterã«ç¹ãããªããªã£ãæã®è§£æ±ºæ¹æ³ ï½ Developers.IO ããã¯ãVeriSignãæªããã§ããã Keychain Accessãåºã¾ã ä¸è¨ã®è§£æ±ºæ³ã«å£ã£ã¦æä½ãããã¨ããã¨ãKeychain Accessãããªã¼ãºãã¾ãã ããªã¼ãº
443ãã¼ã以å¤ãçµ¶æ» ãããã§ã ãã¡ãã¡ã§ãã¼ãã¯éãããã¦ãã¾ããssh ã sftp ããããã·å©ç¨ããå種ãã¼ãã§ã¯ãå ¨ãå¤é¨ã«åºãããæ¥ç¶ã§ããªããããã¯ã¼ã¯ãå¤ãã§ãã TCP/IPãªã®ã«IPã¨ãã¼ãã使ã£ãéä¿¡ãã§ããªããå£ãããããã¯ã¼ã¯ãå½ç¶ã«ãªãã¾ããã ãããã®æ¥ç¶å¶éã«ã¨ã¦ãä¸ä¾¿ãæãããã¨ãå¤ãã§ãã ãµã¼ãã¼ç®¡çè ã®æ°åä¸ã¤ã§ãã¼ãã空ãããéããããç§ã触ã£ã¦ããããã¯ã¼ã¯ã§ã¯ããªã·ã¼ãçµ±ä¸ããããã¯ã½ãããã¯ã¼ã¯ç®¡çè ã«æ¯ãåããã¦ãåãã¯ãã®ãã®ãåãããä¸ä¾¿ãªãã¨ãå¤ãã£ãã®ã§ããããã§ä»æ¹ãªãï¼ï¼ï¼ã使ã£ã¦ãã¾ãã ç§éãå©ç¨ãã端æ«ã§ã¯80/443 ã®ãã¼ãã®å¤é¨æ¥ç¶ãéãããããã¨ã¯å°ãªãã443ã§ããã°éä¿¡ã§ãã¾ãã ãã®ããã443ãã¼ãã«æ§ã ãªã¢ããªã±ã¼ã·ã§ã³ãèµ·åãã¦ããã¨æãã¾ãã 443 ãã¼ãã¨IPã¢ãã¬ã¹ãæ¯æ¸ããã»ã»ã» ãã»ã©ã®G
by Barney Moss ç¡æã§SSLè¨¼ææ¸ãçºè¡ãã¦ããããã¨ã§ãå¤ãã®èªå® ãµã¼ãã¼ã¦ã¼ã¶ã¼ã«éå®ããã¦ããä¸å½æå¤§ç´ã®èªè¨¼å±ãæ²é(WoSign)ããããå½ç©ã®è¨¼ææ¸ãã大éã«çºè¡ãã¦ãããã¨ãæããã«ãªãã¾ããã The story of how WoSign gave me an SSL certificate for GitHub.com | Schrauger.com https://www.schrauger.com/the-story-of-how-wosign-gave-me-an-ssl-certificate-for-github-com Thoughts and Observations: Chinese CA WoSign faces revocation after possibly issuing fake certificates of Github,
Operators of vulnerable servers need to take action. There is nothing practical that browsers or end-users can do on their own to protect against this attack. Is my site vulnerable? Modern servers and clients use the TLS encryption protocol. However, due to misconfigurations, many servers also still support SSLv2, a 1990s-era predecessor to TLS. This support did not matter in practice, since no up
æ»æãåããã°æå·ãè§£é¤ãããéä¿¡ã®å 容ãååãããæãããããå½±é¿ãåããWebãµã¤ãã«ã¯ãæ¥æ¬ã®å¤§æãå«ã¾ããã ã¤ã³ã¿ã¼ãããã®éä¿¡æå·åã«ä½¿ãããSSL/TLSãããã³ã«ã使ã£ã¦éä¿¡ãæå·åãã¦ããHTTPSãµã¤ããªã©ã«æ·±å»ãªèå¼±æ§ãçºè¦ããããç ç©¶ãã¼ã ã¯ãã®èå¼±æ§ããDROWNãã¨å½åãã3æ1æ¥ã«è©³ããæ å ±ãå ¬éãå ¨HTTPSãµã¤ãã®33ï¼ ãå½±é¿ãåããã¨ãã¦ã管çè ã«å¯¾å¿ãæ¥ãããå¼ã³æãã¦ããã ç ç©¶ãã¼ã ãå°ç¨ãµã¤ããéãã¦å ¬éããæ å ±ã«ããã¨ãDROWNæ»æã®èå¼±æ§ã¯ãå¤ãã®ãµã¼ããTLSã«ç§»è¡ããªãããè¨å®ãã¹ãåå ã§ä¾ç¶ã¨ãã¦TLSã®å身ã§ããSSLv2ããµãã¼ããã¦ãããã¨ã«èµ·å ããã ããã¾ã§ã¯ãSSLv2ããµãã¼ããã¦ããã ãã§ã¯ã»ãã¥ãªãã£åé¡ãçããã¨ã¯èãããã¦ããªãã£ããã調æ»ã®çµæãç°¡åã«æ»æã§ãã¦ãã¾ããã¨ã夿ãããµã¼ããã¯ã©ã¤ã¢ã³ããå±éºã«ã
Let's Encrypt is a new certificate authority that is going to issue certificates for free using automated validation process. They have announced that they will enter public beta on Dec. 3rd 2015. This blogpost explains how to setup a H2O using the automated process. Step 1. Install the client % git clone https://github.com/letsencrypt/letsencrypt.git Step 2. Obtain the certificate If you already
ã¯ããã« æ°å®¿é§ ã®ç·è·¯ç«ã¡å ¥ãé¨ãã«å·»ãè¾¼ã¾ãããç·è·¯ç«ã¡å ¥ãã®ã¢ãã¦ã³ã¹ãï¼ã"ç´æ¼¢"ã®é èªãã¨ããæ¬å½ãåãå¤ããªã話ãåãã¦ãã£ã仿¥ãã®é ãçæ§ãããããããã§ããï¼ å æ¥ ( 2015/5/12 )ãIPAãã SSL/TLSæå·è¨å®ã¬ã¤ãã©ã¤ã³ï½å®å ¨ãªã¦ã§ããµã¤ãã®ããã«ï¼æå·è¨å®å¯¾çç·¨ï¼ï½Â ã¨ããè³æãå ¬éããã¾ããã æè¿ã®èå¼±æ§ãå«ããã©ããã£ãè¨å®ãéç¨ãè¡ãã¹ãããæ¸ããã¦ããITã»ãã¥ãªãã£ãITã¤ã³ãã©ã«é¢ããæ¹ãªãå¿ èªã¨ãã£ã¦ããè³æãã¨æããã¾ãã ãã£ããèªãã§çè§£ãã¹ãè³æã ã¨æãã¾ãããåéããããªãã«ãããããå½åº§èªåãé¢ãã£ã¦ããç°å¢ãé©ç¨ããè¨å®ã«çµã£ã¦ãã¤ã³ããã¾ã¨ãã¦ã¿ã¾ã ( èªå/èªç¤¾åãåå¿é²ç®ç )ã â»åç : åçç´ æã±ããã
ä¸å°ä¼æ¥ITæ å½è ãè éä¸ã®ããã° ç¾å½¹ã®ITæ å½è ã§ããªã¼ãã³ã½ã¼ã¹ãæ´»ç¨ããä¸å°ä¼æ¥ã®ITåãæå±ãã¦ããè éä¸ã®ããã°ã§ãã 話é¡ã¯ãªã¼ãã³ã½ã¼ã¹ãä¸å°ä¼æ¥ã®ITåãä¸å°ä¼æ¥ã®ç¾å ´ã®è©±ãªã©ãæ¸ãã¦ãã¾ãã ããã¤ã ã£ãããæããã話ãªã®ã§ãä½é¨è«ãæ¸ãã¾ãã facecookã«ãªããã«ã¼ã«ãã³ã§ãè¦åããã¼ãã£ã¼ãç¹å¥3000åã®åºåããã£ãã (2015å¹´5æ4æ¥æç¹) ç³ãè¾¼ããã¨ããããã¯ã¬ã¸ããæ±ºæ¸ã ã£ãã ä½ãèããã«ç³ãè¾¼ãã ãã ãæ°ã¥ãããSSLé対å¿ã®ãµã¤ãã ã (2015å¹´5æ4æ¥æç¹) (2015å¹´5æ4æ¥æç¹) ããã¦ç¢ºèªã¡ã¼ã«ãæ¥ãã ç§ã®å¹³æã§ç§ã®ã¯ã¬ã¸ããçªå·ãå ¨ã¦æ¸ããã¦ããã¡ã¼ã«ã ã£ãã éä¸ã®çµè·¯ã§çè´ããã¦ããå±éºæ§ãããã¨æãã大æ ã¦ã§ã«ã¼ãä¼ç¤¾ã«é£çµ¡ã ã«ã¼ãã忢ãã¦ããã£ãã ç¿æ¥ããã¼ãã£ä¸»å¬ã®ä¼ç¤¾ããé»è©±ããããã ãçç±ã¯ãããã¾ãã
ãLet's Encryptãã®ãµã¼ãã¹ã§ã¯èª°ã§ãã¯ã³ã¯ãªãã¯ã§ç°¡åã«èªåã®ãã¡ã¤ã³ç¨ã®ãã¼ã·ãã¯ãªãµã¼ãè¨¼ææ¸ãå ¥æãã¦å®è£ ã§ããããã«ããã ã¤ã³ã¿ã¼ãããä¸ã®éä¿¡ãæå·åããTLSã®æ®åãç®æããæè»½ã«å®è£ ã§ãããµã¼ãè¨¼ææ¸ãç¡æã§çºè¡ããèªè¨¼å±ï¼CAï¼ã®ãLet's EncryptãããMozillaãCisco Systemsã¨ãã£ã大æã®ããã¯ã¢ããã§åµè¨ãããã TLSãå©ç¨ããããã«ã¯ãéä¿¡ç¸æã®ãµã¼ããæ¬ç©ã§ãããã¨ãèªè¨¼ããããã®è¨¼ææ¸ããµã¼ãéç¨è ãåå¾ããå¿ è¦ãããããããããããè¨¼ææ¸ã¯ä¸è¬çã«ã¯ææã§ãæ£ããã¤ã³ã¹ãã¼ã«ããã®ãé£ãããã¢ãããã¼ãã«ãæéããããã¨Let's Encryptã¯ææããã ããããåé¡ã解決ãããããLet's Encryptã®ãµã¼ãã¹ã§ã¯èª°ã§ãã¯ã³ã¯ãªãã¯ã§ç°¡åã«èªåã®ãã¡ã¤ã³ç¨ã®ãã¼ã·ãã¯ãªãµã¼ãè¨¼ææ¸ãå ¥æãã¦å®è£ ã§ãããã
2015å¹´2æ19æ¥ãLenovo製åã®PCã®ä¸é¨ã«ããªã¤ã³ã¹ãã¼ã«ããã¦ããã¢ãã¦ã§ã¢Superfishã«æ·±å»ãªåé¡ã確èªãããã¨ãã¦å ±éããã¾ãããããã§ã¯é¢é£æ å ±ãã¾ã¨ãã¾ãã å ¬å¼çºè¡¨ 2015å¹´2æ19æ¥ LENOVO STATEMENT ON SUPERFISH (éæï¼å½åçºè¡¨ã»å¤æ´å¾) 2015å¹´2æ20æ¥ Superfishã«é¢ããã¬ããã®è¦è§£ (éæï¼å½åçºè¡¨ã»å¤æ´å¾) 2015å¹´2æ20æ¥ SUPERFISHã®èå¼±æ§ (éæ) 2015å¹´2æ21æ¥ Updated Lenovo Statement on Superfish (éæ) 2015å¹´2æ21æ¥ Superfish ã«é¢ããã¬ããããã®ãç¥ããï¼æ´æ°ï¼(éæ) è¦è§£å 容 2015å¹´1æä»¥éSuperfishã®ãµã¼ãã¼å´ä½ç¨ã«ããå®å ¨ã«ç¡å¹ã¨ãªã£ã¦ããããã®ç¡å¹åã¯å¸å ´ã«åºåã£ã¦ããå ¨ã¦ã®Superfishã対
Defconã®ã»ãã¥ãªãã£è²¬ä»»è ã¨ãã¦ã»ãã¥ãªãã£ãç ç©¶ããMarc Rogersæ°ã¯ãããã°ã§åã¢ãã¦ã§ã¢ã®åé¡ã®ç¯å²ã¨è¦æ¨¡ã詳細ã«èª¬æãã¦ãããåæ°ã¯ç±³ZDNetã«å¯¾ããæ¶è²»è ã¯ç´ã¡ã«èªåã®ã³ã³ãã¥ã¼ã¿ãææãã¦ãããã©ããã確èªããå¿ è¦ãããã¨è¿°ã¹ãã ãææãã¦ããå ´åã¯ãï¼ã¢ãã¦ã§ã¢ãï¼åé¤ããããã¨ã確èªã§ããã¾ã§ãã®ã³ã³ãã¥ã¼ã¿ããããªã種é¡ã®ã»ãã¥ã¢ãªãã©ã³ã¶ã¯ã·ã§ã³ã«ã使ç¨ãã¦ã¯ãªããªããã¨åæ°ã¯è¿°ã¹ãã ã»ãã¥ã¢ãªãã¼ã¸ã®ä¹ã£åã ç±³ZDNet.comã®Chris Duckettè¨è ã¯ç±³å½æé2æ19æ¥ãLenovoã¯ãSSL/TLSæ¥ç¶ãä»ããã¤ã³ã¿ã¼ããããã©ãã£ãã¯ãååãã¦ä¹ã£åããã¨ã®ã§ãããããèªå·±ç½²åè¨¼ææ¸ãçºè¡ããã«ã¼ãèªè¨¼å±ãã¤ã³ã¹ãã¼ã«ãã¦ããã¨å ±ããã Lenovoã¯åºå伿¥Superfishã¨ææºãã¦ãã¢ãã¦ã§ã¢ãåç¤¾ã®æ¶è²»è åãã³ã³ãã¥ã¼ã¿ã«ã¤
Lenovo製ã®PCã®ä¸é¨ã«Superfishã¨ãããã«ã¦ã§ã¢ãæ¨æºã§ã¤ã³ã¹ãã¼ã«ããã¦ãããã¨ã確èªããã大ããªåé¡ã¨ãªã£ã¦ãã¾ãã [2015-11-24追è¨] DELL製ã®PCã«ãããeDellRootãã¨ãããSuperfishã¨åæ§ã®åé¡ãæã¤ã«ã¼ãè¨¼ææ¸ãå°å ¥ããã¦ããããã§ãã Dellã®PCã«ä¸å¯©ãªã«ã¼ãè¨¼ææ¸ãLenovoã®Superfishã¨åãåé¡ã - ITmedia ã¨ã³ã¿ã¼ãã©ã¤ãº Dude, You Got Dellâd: Publishing Your Privates - Blog - Duo Security Joe Nord personal blog: New Dell computer comes with a eDellRoot trusted root certificate https://t.co/chURwV7eNE eDellRootã§
ãã㯠HTTP/2 ã¢ããã³ãã«ã¬ã³ãã¼19æ¥ç®ã®è¨äºã§ãã ãã®è¨äºã¯ããããã®è³æãèªãã ä¸ã§æ¸ãã¾ããããééãã¨ãåéãã¨ããããããããã¾ãããããããã°ãææãã¦ããã ããã¨å¹¸ãã§ãã å®è³ªçã«å¿ é ã¨ãªã£ãTLS HTTP/2ã¯ãHTTP/1.1ã¨åãããæå·åãªã/ããã®ãã¼ãã¨ãã¦ã80ã¨443ã使ãã¾ãããã®ãããéä¿¡éå§æã«HTTP/1.1ã¨HTTP/2ããã´ã·ã¨ã¼ã·ã§ã³ããããã®ä»çµã¿ããHTTP/2ã§å®ãããã¦ãã¾ãã ãã®ããã«ä»æ§ã¨ãã¦ã¯æå·åãªãã®HTTP/2ãå®ç¾©ããã¦ãã¾ãããFirefox ã Chrome ã TLS ãè¦æ±ããããã«ãå®è³ªçã¯æå·åãããå¿ é ã¨ãªã£ã¦ãã¾ããããã¯ãç±³å½ã®ç£è¦ããã°ã©ã PRISMã«ä»£è¡¨ãããåºåç£è¦(pervasive surveillance)ã«å¯¾æããããã«ãIETFããã¾ãã¾ãªéä¿¡ã«ãã©ã¤ãã·ã®å¼·åãè¦æ±ããæ¹
ã©ã³ãã³ã°
ã©ã³ãã³ã°
ã¡ã³ããã³ã¹
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}