cli
slips
Our great sponsors
cli | slips | |
---|---|---|
8 | 90 | |
3,482 | 1,448 | |
1.6% | 2.1% | |
9.2 | 9.0 | |
3 days ago | 10 days ago | |
Go | Markdown | |
Apache License 2.0 | Creative Commons Attribution Share Alike 4.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
cli
-
Google will disable all but OAuth for IMAP, SMTP and POP starting Sept. 30
https://github.com/smallstep/cli implements some OAuth flows from the CLI, it may be helpful for you.
- Running one’s own root Certificate Authority in 2023
- Uacme: ACMEv2 client written in plain C with minimal dependencies
-
OpenSSL as a GUI
Is the according command line tool (https://github.com/smallstep/cli) from smallstep free and behind this GUI?
-
If you’re not using SSH certificates you’re doing SSH wrong
And they have an open issue for producing a chocolatey package: https://github.com/smallstep/cli/issues/365
-
Should you use Let's Encrypt for internal hostnames?
I'm biased because I'm the founder of the company, but you should check out the certificate management toolchain (CA[1] and CLI[2]) we've built at smallstep. A big focus of the project is human-friendliness. It's not perfect (yet) but I think we've made some good progress.
We also have a hosted option[3] with a free tier that should work for individuals, homelabs, pre-production, and even small production environments. We've started building out a management UI there, and it does map to the CLI as you've described :).
[1] https://github.com/smallstep/certificates
[2] https://github.com/smallstep/cli
[3] https://smallstep.com/certificate-manager/
-
SSH Keys How Are You Managing Them All?
https://github.com/smallstep/cli is pretty amazing, tbh. Documentation is just as stellar!
-
Recommend: Linux-Equivalent Tool of mkcert
https://github.com/smallstep/cli may be a bit overkill for your needs, but it's an epic toolkit and well worth checking out!
slips
-
As XRP Toolkit doesn't support Trezor, is there an alternative way to use SetRegularKey on my Trezor to be able to register for the Evernode Airdrop via Xumm?
The official SLIP-0039 standard itself confirms it is not possible to convert this mnemonic type to BIP-0039. Down in Section 9 "Compatibility with BIP-039":
-
Shamir Secret Sharing
For anybody new or returning to SSS, check out SLIP-0039: https://github.com/satoshilabs/slips/blob/master/slip-0039.m...
One of the big downsides of SSS is that it’s very raw and you have to do a lot of legwork to make it actually useable. It’s rightfully criticized for this and the argument follows the don’t roll your own crypto vein.
SLIP39 solves this by formalizing a protocol for handling SSS splits built atop standards for crypto key serialization (BIP-39). SlIP shards are unique on each generation so parties with the same underlying SSS shard can’t compare mnemonics, they’re mnemonically serialized, and have a checksum and group index metadata which makes a more sane UX possible when combining.
-
Trezor-T XMR Account Recovery (do not use, sample only)
Well every wallet chose to solve this problem independently. Trezor proposed a new standard called SLIP10 to do BIP44 type operations coins that did not use secp256k1. Problem is, there are very few utilities I've found that will do SLIP10 derivations.
-
Seed Conversion Woes
Checkout the SLIPs repo (https://github.com/satoshilabs/slips.git) and modify testvectors.py. We are going to replace the curvenames and last four show_testvectors lines with the following:
-
Reminder: Trezor Shamir Backup is fundamentally secure
They use an open source algorithm which is documented here. Anyone can verify it and the recovery outside of a Trezor hw-wallet is possible if required.
-
Article explaining how Ledger Recover works
It will be using SLIP-39, like Trezor and Electrum, or a Ledger rewrite of it. All the language about shards is straight from the SLIP39 spec.
- Is it possible to have both BTC and XMR keys stored on the same Trezor at the same time?
-
Simple sample script to dump Trezor Coinjoin taproot addresses
This was all done with the SLIP-14 seed using the passphrase coinjoin if you want to follow along.
-
Simple sample script to dump coinjoin taproot addresses
With the introduction of the new Coinjoin feature in the latest release of firmware and software, I had the need to dump some of my taproot derivations. Although blockbook can do this fine using descriptors in place of xpubs for taproot accounts, it fails on Coinjoin accounts. This is likely because SLIP-25 as 6 deep derivations while BIP-86 uses a standard derivation depth of 5.
-
coinjoin funds accessible to other wallets?
The recovery of Coinjoin accounts is described here. Accessing them outside of Trezor Suite will 100% destroy all privacy obtained since Suite is the only keeper of the anonymity set for each UTXO. Using your CJ coins outside of Suite may also erode the privacy of previous transactions using your Suite Private coins as well.
What are some alternatives?
jose-jwt - Ultimate Javascript Object Signing and Encryption (JOSE), JSON Web Token (JWT) and Json Web Keys (JWK) Implementation for .NET and .NET Core
bip39 - A web tool for converting BIP39 mnemonic codes
authy - Go library and program to access your Authy TOTP secrets.
shamir39 - Split BIP39 mnemonics using Shamir's Secret Sharing Scheme
ssh-baseline - DevSec SSH Baseline - InSpec Profile
python-shamir-mnemonic
mkcert - A simple zero-config tool to make locally trusted development certificates with any names you'd like.
bips - Bitcoin Improvement Proposals
sio-go - Authenticated encryption for streams in Go
slip39 - A web tool for SLIP39 mnemonic shares
getssl - obtain free SSL certificates from letsencrypt ACME server Suitable for automating the process on remote servers.
python-mnemonic - :snake: Mnemonic code for generating deterministic keys, BIP39