by konklone on 1/6/17, 7:53 PM with 19 comments
by bertil on 1/7/17, 4:34 AM
I’ve complained a lot about how US-based company do not thing about non-US users enough (that common rant is obviously not applicable to GSA, although American abroad, immigrants and foreign visitors probably quality) but in that rant, I have forgotten the original Americans. Shame on me. I have never heard of any start-up asking “What about First Nations? Do we support Cherokee alphabet? Is there a Sioux exception for the law that we are enforcing in that form?”
by garrettr_ on 1/6/17, 9:20 PM
It's a promising project, and could use more contributors if anyone here is interested: https://github.com/dhs-ncats/pshtt/issues for ideas!
by discreditable on 1/6/17, 10:13 PM
by alpb on 1/6/17, 10:20 PM
by randomdrake on 1/6/17, 9:07 PM
While the article did a good job explaining how pshtt works and how it generates data for the reporting, it didn't dive too much into the scanning itself. Since this is posted on Hacker News, I'd love to hear more about the nitty gritty of the data collection itself.
Can you talk about what sort of setup you run, and what sort of technical and interdepartmental challenges you run into scanning, storing, and obtaining data for 1,143 government websites?
by ycmbntrthrwaway on 1/6/17, 11:59 PM
by hmft on 1/6/17, 8:18 PM
by DyslexicAtheist on 1/7/17, 11:40 AM
function certchain() {
# Usage: certchain
# Display PKI chain-of-trust for a given domain
# GistID: https://gist.github.com/joshenders/cda916797665de69ebcd
if [[ "$#" -ne 1 ]]; then
echo "Usage: ${FUNCNAME} <ip|domain[:port]>"
return 1
fi
local host_port="$1"
if [[ "$1" != *:* ]]; then
local host_port="${1}:443"
fi
openssl s_client -connect "${host_port}" </dev/null 2>/dev/null | grep -E '\ (s|i):'
}
by eeZah7Ux on 1/6/17, 9:13 PM