How to calculate and verify the signature of a signing certificate programmatically on the runtime - security

How to calculate and verify the signature of a signing certificate programmatically on the runtime.
gradle and api version which i am currently using
min sdk version: 28
target sdk version: 33
gradle version :6.6.1

Related

How to know the OpenSSL version for WebApp hosted in Azure cloud

I know it is not related to coding but really need to know this. Already googled it but no concrete answer was found.
The client wants to know whether our application is vulnerable to the latest vulnerability which is found in OpenSSL.
CVE-2022-3786
CVE-2022-3602
Reference: https://snyk.io/blog/new-openssl-critical-vulnerability/
You can find vulnerable machines with Defender for Cloud’s inventory tools:
Sign in to the Azure portal.
Navigate to Microsoft Defender for Cloud > Inventory
Use the built-in filters to find your at-risk machines:
Use the Installed applications filter to search for “contains openssl” or specific packages
Use the Installed applications versions filter to find the affected versions (3.0.0-3.0.6)
Source: https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/new-openssl-v3-vulnerability-prepare-with-microsoft-defender-for/ba-p/3666487
According to Tenable:
OpenSSL version 3.0.7 has been released to address these vulnerabilities.
You won't say what kind of WebApp you have but updating OpenSSL in your WebApp will be enough.
UPDATE
You can get your OpenSSL Version with the command openssl version
You can find the app service console in your Azure portal
MSFT announced Defender CSPM at Ignite, one of the features of DCSPM is Cloud Security Explorer and it has a built in template for this exact scenario. The feature is in preview and can be used for free (for now)
OpenSSL Detection

AADSTS50011: The reply URL specified in the request does not match the reply URLs configured for the application: 'cf710c6e-dfcc-

I keep on getting this error:
AADSTS50011: The reply URL specified in the request does not match the reply URLs configured for the application: 'cf710c6e-dfcc-4fa8-a093-d47294e44c66'.
Getting this error in Visual Studio in an SSIS project. In my project I added an Analysis Services Processing Task to my control flow.
When I start to edit the Analysis Services Processing Task, Authentication window opens I sign in then the above error is presented.
This has never been a problem. This started 1 day ago. Cant explain why.
I have update the following
Visual Studio 2019 + Data Tools and extensions
SQL Management Studio
Any help will be much a appreciated
The current error message you are facing is due to the retirement of old client libraries. Microsoft shared the following warning to customers that were using older versions of client libraries:
Analysis Services client libraries version 19.12.3.0 or higher offers important security enhancements, so any applications that are still using earlier versions of the Analysis Services client libraries will not be supported after 30 June 2021.
Action required
To minimize risk and potential security vulnerabilities, please update your Analysis Services client libraries to version 19.12.3.0 or higher before 30 June 2021.
However, ( I believe ) the actual implementation date was on the 5th of July.
If you are facing issues connecting using SSMS/SSIS/VS:
Update the AS Libraries to the latest version from Analysis Services client libraries | Analysis Services client libraries
Update your SSMS to the latest version v18
Make Sure you have the latest updates for SSIS
If you are facing any issues with connecting using Excel:
Please check if you are using Excel’s MSI version or the ClickToRun version (This can be found using File > Account and About Excel)
If using MSI version, directly downloading the latest AS client libraries and upgrading them can help mitigate the issue (latest versions can be downloaded here: Analysis Services client libraries) “same as SSMS”
If using the ClickToRun version, please install the latest Office updates to help push the latest AS OLEDB libraries
One quick solution to help mitigate the issue, is to download and
install the latest client drivers and then copy from "AS OLEDB\140"
folder into the Excel ClickToRun’s ASOLEDB\140 folder and test if it solves the issue. Please take a backup of the existing ASOLEDB folder within MS Office.
Copy From:
C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\140
To:
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\ [If 64-bit]
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\ [If 32-bit]

IBM MobileFirst 8 APK Creation

I am creating an APK for release to play store my question is while creating the APK ,i am selecting Generate Signed Bundle or APK but i am not sure if i should use a locally created keystore file by me or it needs some other keystore file the one present in the MFP console runtime settings.
The keystore present in MobileFirst Operations console is for MobileFirst server's use.
To sign your Android application , you should use another keystore.
Refer to the Android documentation for more details on signing your application. Details can be found here.

Docusign Java Client SDK support for JDK 1.8

Do we have a Docusign Java client SDK that's compatible with JDK 1.8? Has anyone tried using Docusign Java Client SDK with 1.8? The latest SDK version needs JDK 1.9+. Reference - https://github.com/docusign/docusign-java-client
As of now, https://github.com/docusign/docusign-java-client/tree/3.6.0 seems to be the last version that supports JDK 1.8.

Eclipse Ditto FIPS 140-2 compliance

What crypto library does Eclipse Ditto use by default? I need to determine if it is FIPS 140-2 validated. If not is there a way to build Ditto with an alternative crypto library that's validated?
Eclipse Ditto is not FIPS 140-2 compliant (to be honest that is the first time that I hear of FIPS 140-2).
I guess you figured that our already.
Ditto uses the OpenJ9 JVM including OpenJDK 11 (since Ditto 1.1.0) with its by default included crypto provider.
So I guess you would have to fork Ditto and switch out the used Java runtime bundled inside the Docker image to a FIPS 140-2 validated one (or use a Docker base image which contains a a certified Java runtime) and build your own Ditto Docker images.

Resources