zlint
cli
zlint | cli | |
---|---|---|
3 | 8 | |
342 | 3,487 | |
2.3% | 0.8% | |
8.7 | 9.2 | |
5 days ago | 2 days ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
zlint
-
Let's Encrypt Acme API Outage
Yup, the two most popular are:
https://github.com/zmap/zlint
https://github.com/certlint/certlint
They each have their strengths and weaknesses, so CAs are advised to use both.
- zlint: X.509 Certificate Linter focused on Web PKI standards and requirements.
-
Introducing Certomancer: the Python X.509 testing framework.
Can you compare it with https://github.com/zmap/zlint as a cert linter?
cli
-
Google will disable all but OAuth for IMAP, SMTP and POP starting Sept. 30
https://github.com/smallstep/cli implements some OAuth flows from the CLI, it may be helpful for you.
- Running one’s own root Certificate Authority in 2023
- Uacme: ACMEv2 client written in plain C with minimal dependencies
-
OpenSSL as a GUI
Is the according command line tool (https://github.com/smallstep/cli) from smallstep free and behind this GUI?
-
If you’re not using SSH certificates you’re doing SSH wrong
And they have an open issue for producing a chocolatey package: https://github.com/smallstep/cli/issues/365
-
Should you use Let's Encrypt for internal hostnames?
I'm biased because I'm the founder of the company, but you should check out the certificate management toolchain (CA[1] and CLI[2]) we've built at smallstep. A big focus of the project is human-friendliness. It's not perfect (yet) but I think we've made some good progress.
We also have a hosted option[3] with a free tier that should work for individuals, homelabs, pre-production, and even small production environments. We've started building out a management UI there, and it does map to the CLI as you've described :).
[1] https://github.com/smallstep/certificates
[2] https://github.com/smallstep/cli
[3] https://smallstep.com/certificate-manager/
-
SSH Keys How Are You Managing Them All?
https://github.com/smallstep/cli is pretty amazing, tbh. Documentation is just as stellar!
-
Recommend: Linux-Equivalent Tool of mkcert
https://github.com/smallstep/cli may be a bit overkill for your needs, but it's an epic toolkit and well worth checking out!
What are some alternatives?
certificate-transparency - Auditing for TLS certificates.
jose-jwt - Ultimate Javascript Object Signing and Encryption (JOSE), JSON Web Token (JWT) and Json Web Keys (JWK) Implementation for .NET and .NET Core
go-guardian - Go-Guardian is a golang library that provides a simple, clean, and idiomatic way to create powerful modern API and web authentication.
slips - SatoshiLabs Improvement Proposals
certlint - X.509 certificate linter
authy - Go library and program to access your Authy TOTP secrets.
certomancer - Quickly construct, mock & deploy PKI test configurations using simple declarative configuration.
ssh-baseline - DevSec SSH Baseline - InSpec Profile
acmetool - :lock: acmetool, an automatic certificate acquisition tool for ACME (Let's Encrypt)
mkcert - A simple zero-config tool to make locally trusted development certificates with any names you'd like.
certificates - 🛡️ A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH.
sio-go - Authenticated encryption for streams in Go