You can subscribe to this list here.
2001 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
(1) |
Dec
(1) |
---|---|---|---|---|---|---|---|---|---|---|---|---|
2002 |
Jan
(3) |
Feb
(2) |
Mar
|
Apr
(3) |
May
|
Jun
(1) |
Jul
|
Aug
(1) |
Sep
|
Oct
(1) |
Nov
|
Dec
(1) |
2003 |
Jan
|
Feb
|
Mar
(1) |
Apr
|
May
(2) |
Jun
(2) |
Jul
|
Aug
|
Sep
|
Oct
(1) |
Nov
|
Dec
|
2004 |
Jan
(1) |
Feb
(1) |
Mar
(2) |
Apr
|
May
(1) |
Jun
(2) |
Jul
|
Aug
|
Sep
(2) |
Oct
|
Nov
(1) |
Dec
(1) |
2005 |
Jan
|
Feb
(1) |
Mar
|
Apr
(1) |
May
(1) |
Jun
|
Jul
|
Aug
(1) |
Sep
|
Oct
|
Nov
(1) |
Dec
|
2006 |
Jan
|
Feb
|
Mar
|
Apr
(1) |
May
(1) |
Jun
(1) |
Jul
|
Aug
|
Sep
(2) |
Oct
|
Nov
(1) |
Dec
(1) |
2007 |
Jan
(3) |
Feb
(1) |
Mar
|
Apr
(1) |
May
|
Jun
(1) |
Jul
(1) |
Aug
(1) |
Sep
(2) |
Oct
|
Nov
(1) |
Dec
(1) |
2008 |
Jan
(2) |
Feb
|
Mar
(1) |
Apr
(1) |
May
(1) |
Jun
(1) |
Jul
(3) |
Aug
(2) |
Sep
(3) |
Oct
(2) |
Nov
(1) |
Dec
(1) |
2009 |
Jan
(2) |
Feb
(1) |
Mar
(1) |
Apr
|
May
|
Jun
(2) |
Jul
|
Aug
(1) |
Sep
|
Oct
(2) |
Nov
(1) |
Dec
(1) |
2010 |
Jan
(1) |
Feb
|
Mar
(3) |
Apr
|
May
(2) |
Jun
(4) |
Jul
|
Aug
(1) |
Sep
(1) |
Oct
(1) |
Nov
(3) |
Dec
(2) |
2011 |
Jan
|
Feb
(1) |
Mar
(3) |
Apr
|
May
(4) |
Jun
(1) |
Jul
(1) |
Aug
|
Sep
|
Oct
(1) |
Nov
(3) |
Dec
(1) |
2012 |
Jan
|
Feb
|
Mar
(2) |
Apr
|
May
(1) |
Jun
(3) |
Jul
|
Aug
(1) |
Sep
|
Oct
|
Nov
|
Dec
(1) |
2013 |
Jan
|
Feb
(1) |
Mar
|
Apr
|
May
(2) |
Jun
(1) |
Jul
|
Aug
|
Sep
|
Oct
|
Nov
(1) |
Dec
(2) |
2014 |
Jan
|
Feb
|
Mar
(4) |
Apr
(1) |
May
|
Jun
|
Jul
|
Aug
(1) |
Sep
|
Oct
|
Nov
|
Dec
|
2015 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
(1) |
Nov
(1) |
Dec
|
2016 |
Jan
|
Feb
|
Mar
(2) |
Apr
|
May
|
Jun
|
Jul
(1) |
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2017 |
Jan
(2) |
Feb
(2) |
Mar
|
Apr
(1) |
May
|
Jun
|
Jul
(1) |
Aug
|
Sep
|
Oct
|
Nov
|
Dec
(1) |
2018 |
Jan
|
Feb
|
Mar
(1) |
Apr
|
May
|
Jun
(1) |
Jul
|
Aug
|
Sep
(2) |
Oct
|
Nov
|
Dec
(1) |
2019 |
Jan
|
Feb
|
Mar
|
Apr
|
May
(1) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
(1) |
2021 |
Jan
|
Feb
|
Mar
(1) |
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2022 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
(2) |
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
From: Tomas G. <Tom...@ke...> - 2022-06-13 12:23:07
|
>From now on, our main discussion forum is on GitHub. Please join us there to share knowledge or ask questions to other developers or the product team: EJBCA Discussions on GitHub<https://github.com/Keyfactor/ejbca-ce/discussions>. The SourceForge mailing lists will be discontinued during 2022. We also welcome you to sign up for our Newsletter on Keyfactor Community,<https://www.keyfactor.com/community/> to stay up to date on the latest news, software updates, hands-on tutorials and user workshops on all our open-source software. Best regards, Tomas [1]: https://github.com/Keyfactor/ejbca-ce/discussions [2]: https://www.keyfactor.com/community/ |
From: Tomas G. <Tom...@ke...> - 2022-06-01 13:21:34
|
We are pleased to announce the release of EJBCA Community 7.9.0.1. Release highlights include: * More frequent EJBCA Community releases * More flexible certificate enrollment via REST API * Connect certificates to any identities with External Account Bindings Since the last Community release a lot of things have been updated, and you can find all information in release notes. For more information: Read the full EJBCA 7.9.0.1 Release Notes<https://doc.primekey.com/x/HgYVAw> Visit the EJBCA project on ejbca.org<https://www.ejbca.org/>. Follow the discussion forum on GitHub, see EJBCA Discussions on GitHub<https://github.com/Keyfactor/ejbca-ce/discussions>. Regards, The EJBCA Team |
From: Tomas G. <to...@pr...> - 2021-03-31 09:14:22
|
Hi, After a long wait. A new major update to EJBCA Community is out. Read the full announcement here: https://www.ejbca.org/news/ejbca-community-7-4-released/ Also on the download page at ejbca.org: https://www.ejbca.org/download/ There is a link to the updated community source repository, which is now on GitHub. https://github.com/primekeydevs/ejbca-ce Our goal is to not be so long between releases in the future. Regards, Tomas and the EJBCA Team |
From: Tomas G. <to...@pr...> - 2019-12-04 10:52:51
|
EJBCA 6.15.2.5 has been released with the following changelog. On the Community roadmap is a larger release during 2020 with full support for Java 11 among other things. Regards, Tomas --- This is a patch release of EJBCA Community Edition with a few security fixes and increased test stability. Full ticket descriptions can be found in the issue tracker https://jira.primekey.se/ where we also look forward to your feature requests and/or patches. Thank you for all the testing, feedback and patches we received during 2019 and happy holiday hacking! 6.15.2.5: ** Bug * [ECA-8679] - Security issue * [ECA-8691] - Add upgrade notes for ECA-8679 ** Task * [ECA-8693] - Security: Backport upgrade of external dependency 6.15.2.4: ** Bug * [ECA-8667] - Update CESeCoreUtils and back-port build.cesecore.p11.jar option 6.15.2.3: ** Bug * [ECA-8319] - "clientToolBox PKCS11HSMKeyTool linkcert" command should work according to ICAO 9303 * [ECA-8345] - Jenkins failing test 'org.ejbca.core.model.services.worker.CertificateCrlReaderSystemTest.testReadCertificateFromDisk' 6.15.2.2: ** Bug * [ECA-7991] - Make ApprovalSessionTest reliable * [ECA-8010] - JBoss CLI on Jenkins uses too much memory on Jenkins * [ECA-8017] - SernoGeneratorRandom fails to build on JDK7 * [ECA-8072] - CaRenewCACommandTest stops working after 2019-04-15 * [ECA-8320] - SCP Publisher uses managing admin to sign payload * [ECA-8322] - CertificateCrlReader does not handle revocation publications correctly ** Task * [ECA-8205] - Update french language file for admin UI |
From: Tomas G. <to...@pr...> - 2019-05-14 15:08:15
|
Hi, The EJBCA project has worked for some time on making CI pipe-line work with containers. The result of this is that EJBCA Community is now available on DockerHub. Regularly updated, and easy to pull. We recommend this as a great way to test EJBCA, integrate and just in general try things out. EJBCA Community on DockerHub: https://hub.docker.com/r/primekey/ejbca-ce Or for the one liner, just go: docker pull primekey/ejbca-ce Depending on your policy and requirements there may be things to consider if you plan on putting containers in production, such as HSM support and connecting to your database of choice, the integrity of pulling production code from dockerhub, other secure concerns etc. The standard stuff. Regards, The EJBCA Team --- Registration for PrimeKey Tech Days 2019 is now open. PKI Tech Days in Stockholm, Sweden, 17-18 September www.primekey.com/tech-days |
From: Tomas G. <to...@pr...> - 2018-12-21 12:56:43
|
Hi, The EJBCA Team would like to wish everyone a merry Christmas and happy new year. We are closing 2018 and looking forward to a new great PKI year 2019. The coming two weeks are expected to be quiet, but we have been working hard the last year. Some of the ground work done will make it easier to bring cool things next year. You may have noticed EJBCA Enterprise being launched in AWS, which is so far the absolutely easiest way to launch a CA, for testing or for production. See the info on http://www.ejbca.org/. We're not forgetting the Community though. Due to babies being delivered the end of this year some deliverables have been a bit postponed, but there are great plans for 2019...think containers...backed by a complete CI pipe-line built for continuous delivery. If you search closely you may find a sneak preview, from the official source, on a Hub near you. Merry Christmas from the EJBCA Team. /Tomas |
From: Tomas G. <to...@pr...> - 2018-09-14 08:33:38
|
Sorry, this should have been posted/approved to ejbca-develop, I didn't notice the difference. Regards, Tomas On 2018-09-14 09:48, Vikas Gupta wrote: > Hi everyone, Can someone help me find the installer for ejbca 6.14.1. > Sourceforge only has versions up to 6.10. > > > > > > Thank you. > > -Vikas > > > > > > _______________________________________________ > Ejbca-news mailing list > Ejb...@li... > https://lists.sourceforge.net/lists/listinfo/ejbca-news > |
From: Vikas G. <vik...@an...> - 2018-09-14 08:14:55
|
Hi everyone, Can someone help me find the installer for ejbca 6.14.1. Sourceforge only has versions up to 6.10. [cid:image001.png@01D44BC4.B1CC0C80] Thank you. -Vikas |
From: Tomas G. <to...@pr...> - 2018-06-28 10:10:20
|
* * *Invitation to PrimeKey Tech Days 2018* 18 - 19 September, Stockholm Sweden We are happy to invite you to PrimeKey Tech Days 2018! PrimeKey Tech Days is our two day tech event featuring speakers in PKI, Crypto, Open Source, eIDAS, Digital Signing and many other interesting topics in IT-Security. https://www.primekey.com/tech-days/ *Join us and listen to distinguished speakers from:* - Google - Ericsson - Legion of the Bouncy Castle - Utimaco - DarkMatter - Siemens - InfoSec Global - Nimbus Technologieberatung GmbH - PrimeKey - ...and more *Develop both your skills and your network* PrimeKey Tech Days is a great chance to learn about what's new in the field, to get inspiration and to network with some of the best PKI, Crypto and IT-Security from around the globe. This is a hard core tech event, so you'll meet engineers, PKI experts, Solution Architects, Developers, and many more skilled IT-Security professionals from all types of companies and organizations. * * *Dinner and boat ride* The agenda on Tuesday includes an evening boat tour of scenic Stockholm, followed by dinner at Fotografiska with a spectacular view of the Stockholm seaside. Fotografiska has recently been awarded “The world’s best museum restaurant”. This evening activity is a great chance for you to expand your network, not only with PrimeKey but with IT-Security professionals from all over the globe. We look forward to seeing you in Stockholm! For continous updates, new speakers and more; follow us on LinkedIn and Twitter. https://www.linkedin.com/company/primekey-solutions-ab https://www.twitter.com/primekeyPKI! <https://www.twitter.com/primekeyPKI%21> We hope to see you in September! / The PrimeKey team Read more and Sign up: https://www.primekey.com/tech-days/ See the event film: https://youtu.be/lNK-w4uKs-E Best regards, *Tomas Gustavsson * -- PrimeKey *Follow PrimeKey* *https://www.linkedin.com/company/primekey-solutions-ab* https://www.twitter.com/primekeyPKI Find PrimeKey on AWS <https://aws.amazon.com/marketplace/seller-profile?id=7edf9048-58e6-4086-9d98-b8e0c1d78fce&ref=dtl_B078PLGJWL> |
From: Tomas G. <to...@pr...> - 2018-03-01 16:46:43
|
Hi everyone, The EJBCA Team is very pleased to release EJBCA Community 6.10.1.2. This is a major upgrade providing lots of new features as well as many large and small improvements and bugfixes. You can get it directly from the EJBCA homepage <https://www.ejbca.org/>. The absolutely largest user noticeable feature is the introduction of a completely new RA UI, scheduled to deprecate the old Public Web as described here: Roadmap Update EJBCA 7 and what lies in store <http://blog.ejbca.org/2018/02/roadmap-update-ejbca-7-and-what-lies-in.html>. The new RA UI is a major step up of RA capability in EJBCA and is described in depth in a four part blog post series: * Introducing the EJBCA RA, Part 1: Introduction <http://blog.ejbca.org/2017/06/introducing-ejbca-ra-part-1-introduction.html> * Introducing the EJBCA RA, Part 2.1: Migrating from the Public Web <http://blog.ejbca.org/2017/07/introducing-ejbca-ra-part-21-migrating.html> * Introducing the EJBCA RA, Part 2.2: Migrating from the Public Web (continued) <http://blog.ejbca.org/2017/07/introducing-ejbca-ra-part-22-migrating.html> * Introducing the EJBCA RA, Part 3: Architecture of an RA Proxy <http://blog.ejbca.org/2017/10/introducing-ejbca-ra-part-3.html> Apart from this feature there are many other features worth highlighting such as: - Support for Service Name in certificates (RFC 4985 <https://www.ietf.org/rfc/rfc4985.txt>) - Support for XMPP Client certificates (RFC 6120 <https://www.ietf.org/rfc/rfc6120.txt>) - Support for ID on SIM (RFC 4683 <https://www.ietf.org/rfc/rfc4683.txt>) - Support for RegisteredID in the SAN - Functional enhancements to the CMP protocol <https://www.ietf.org/rfc/rfc4210.txt> and CMP aliases, including CMP central key generation - Option to keep revoked expired certificates on CRLs - Fine grained validity period configuration, down to minutes as well as - ability to configure certain days when certificates can not expire - A new ejbca-setup quick setup script <https://www.ejbca.org/docs/installation.html#Quick%20Start%20Guide> for Linux - Ability to limit OIDs that are acceptable in Extension Override - A completely new Role system <https://www.ejbca.org/docs/userguide.html#Administrator%20Roles> that is easier to manage, including role management in the RA UI - A new Validator <https://www.ejbca.org/docs/adminguide.html#Validators> concept, allowing Key Validation to be performed before certificates are issued (as well as CAA validation in Enterprise for example) - Security hardening and other security improvements - And a lot more which don't fit into this limited space... The full changelog between the old and the new Community release can be seen in the Sourceforge download directory <https://sourceforge.net/projects/ejbca/files/ejbca6/ejbca_6_10_0/>. or download directly <https://sourceforge.net/projects/ejbca/files/ejbca6/ejbca_6_10_0/README/download>. We have also ensured that upgrades from older version of EJBCA is still possible, and documented this in: The Definitive EJBCA Upgrade Guide <http://blog.ejbca.org/2017/12/the-definitive-ejbca-upgrade-guide.html> In all we are very proud of this release and you should notice some large enhancements and a lot of new functions. If there was anything you missed in the last release, there is a good chance you will find it in the new release. Regards, The EJBCA Team -- RSA Conference 2018 ------------------------------------------------------------------ San Francisco | April 16-20 | Moscone Center Come visit us in booth #1518 at RSA Conference 2018! Want a free expo pass? Go to https://www.rsaconference.com/events/us18/register and use the code: X8EPRIME |
From: Tomas G. <to...@pr...> - 2017-12-01 15:27:42
|
Hi, We have been fine tuning the upgrade process, including from very old installations. To make the upgrade process as smooth as possible for everyone we have released an intermediate release of EJBCA, version 6.3.2.6. A guide is publishing on the blog: http://blog.ejbca.org/2017/12/the-definitive-ejbca-upgrade-guide.html We have tested upgrades from as old versions of EJBCA as 3.0.7, which was released in April 2005. Regards, The EJBCA Team |
From: Karin T. <kar...@pr...> - 2017-07-10 11:24:34
|
Hi, As a user of EJBCA Community you may have seen that we at PrimeKey are hosting our very popular Tech Days in September. This is perhaps the only real hard core PKI event during 2017, and you are hereby invited. The demand for tickets is high as usual, and during previous years all tickets have quickly sold out. In order to accommodate for the high demand Tech Days have been moved to a larger venue, while keeping the same quality in speakers. As always, we take pride in having speakers who are of true value for our highly technically skilled audience. So far we have released four of these speakers: Cisco on EST, David Hook (Bouncy Castle), Siemens on Industrial IoT and DarkMatter on PKI. Keep an eye on our LinkedIn and Twitter to see when we release more speakers. In addition to our esteemed guest speaker we will of course give you the latest updates on the PrimeKey product roadmaps and insights. At PrimeKey Tech Days you will not only get to listen to many interesting speakers but you also get the opportunity to meet and mingle with some of the world's best minds in PKI and IT Security. This is something we know that attendees really appreciate and we will therefore arrange a boat tour and dinner for all attendees on the first evening of the event. If you want to know more about Tech Days or register for the event, click here: https://www.primekey.com/tech-days Date: 25 - 26 of September Place: Stockholm, Sweden Ticket fee: 380 Euro + VAT. Accommodation: We recommend Berns Hotel. A special deal for Tech Days attendees can be found here: https://www.primekey.com/tech-days Welcome! Best regards, Karin Trogstam and the PrimeKey Team -- PrimeKey CMO kar...@pr... Lundagatan 16, SE-171 63 Solna, Sweden <https://www.primekey.com/> https://www.primekey.com Follow PrimeKey <https://www.linkedin.com/company/primekey-solutions-ab> https://www.linkedin.com/company/primekey-solutions-ab <https://www.twitter.com/primekeyPKI> https://www.twitter.com/primekeyPKI Join PrimeKey Tech Days 2017 <https://www.primekey.com/tech-days> https://www.primekey.com/tech-days |
From: Tomas G. <to...@pr...> - 2017-04-06 10:55:05
|
Hi, We are pleased to release EJBCA Community 6.5.0.5. This release fixes two upgrade bugs, when upgrading from EJBCA 4.0 or earlier, and backports two other minor fixes. Upgrades from EJBCA 4.0 should now work smoothly. All in all, there are only 4 fixes in this release. You can also see a summary of all changes from the last Community release in the download section. https://sourceforge.net/projects/ejbca/files/ejbca6/ejbca_6_5_0/ Read the full change log (Changelog.txt) for details, and see the UPGRADE document for all functionality changes and upgrade instructions. These are both available in the download package. Regards, The EJBCA Team |
From: Tomas G. <to...@pr...> - 2017-02-13 14:25:57
|
Hi, We are pleased to release EJBCA Community 6.5.0.4. This release fixes an upgrade bug, and two pages that did not work in WildFly 10. In addition it has a security fix an a couple of other minor fixes. All in all, there are only 7 fixes in this release. You can also see a summary of all changes from the last Community release in the download section. https://sourceforge.net/projects/ejbca/files/ejbca6/ejbca_6_5_0/ Read the full change log (Changelog.txt) for details, and see the UPGRADE document for all functionality changes and upgrade instructions. These are both available in the download package. Regards, The EJBCA Team -- PrimeKey at RSA Conference 2017 ------------------------------------------------------------------ San Francisco | February 13-17 | Moscone Center Come visit us in booth #627 at RSA Conference 2017! Want a free expo pass? Go to https://www.rsaconference.com/events/us17/register and use the code: XE7PRMKEY |
From: Tomas G. <to...@pr...> - 2017-02-02 17:07:44
|
Hi, After a too long silence the EJBCA Team is very pleased to release EJBCA Community 6.5.0. We acknowledge that this release has been due for a long time, and we are working hard to increase communication in the future. So continue to monitor this space. This release has primarily focused on tuning up the UI and responding to security developments in the Java EE world in the last few months. We've shifted plenty of focus to QA during this period, so this version is the most stable we've released yet. All in all, we've fixed 145 new features in this specific release, bugs and improvements. The delta from the latest Community release are hundreds of more issues. A selection of noteworthy improvements. Administration UI: - Certificate profiles can now be set to restrict key algorithms, curves (for EC) and key length. - The CSCA "CA Name Change" feature from ICAO 9303 7th part 12 has been implemented. - Fixed a possible information leakage in the administrative web in regards to certificate and end entity profiles. - Auditor default role has been given access to additional pages in the UI - The Auditor Role has been extended, and now has read access to End Entities, all configurations and roles. - Granular control has been added to DN and SAN elements in End Entity Profiles. Entered values can be controlled using regular expressions. - Most of the UI has been given read-only rights, and a new role template (named Auditor) can be created and built upon to allow an auditor to view but not modify. - Custom Certificate Extensions and Extended Key Usages can now be added on the fly from the UI, so no longer is a JBoss restart required when new ones are added. General Cryptography: - The underlying BouncyCastle library has been upgraded to version 1.54 Documentation: - All return and error codes from the CMP servlet have been documented. OCSP: - OCSP responder can now cache the revocation status of client certificates (used to sign requests) for limited time periods. - X-Forwarded-For is now logged if present in OCSP requests External RA: - CMP Proxy now checks for message signatures, HMAC and checks revocation status for signing certificates, relieving the CA of handling unauthorized messages. General: - WildFly8 and WildFly9 are now supported platforms. - Upgrade procedure has been improved, and EJBCA now tracks its own version, allowing many steps that were previously performed as part of manual upgrades to be performed automatically instead. - Much security hardening and improvements. - Upgraded internal libraries You can also see a summary of all changes from the last Community release in the download section. https://sourceforge.net/projects/ejbca/files/ejbca6/ejbca_6_5_0/ Read the full change log for details, and see the UPGRADE document for all functionality changes and upgrade instructions. These are both available in the download package. Regards, The EJBCA Team -- RSA Conference 2017 ------------------------------------------------------------------ San Francisco | February 13-17 | Moscone Center Come visit us in booth #627 at RSA Conference 2017! Want a free expo pass? Go to https://www.rsaconference.com/events/us17/register and use the code: XE7PRMKEY |
From: Tomas G. <to...@pr...> - 2017-01-24 08:18:21
|
Hi, PS: Sorry, I missed that this was posted to ejbca-news, it should have been for ejbca-develop. Further posts should be directed to the ejbca-develop list. This will by default not be added as an attribute to LDAP. You do have it as an "LDAP location fields from certificate DN", but normal LDAP schemas will probably reject this so you have to use your own schema. Regards, Tomas --- RSA Conference 2017 ------------------------------------------------------------------ San Francisco | February 13-17 | Moscone Center Come visit us in booth #627 at RSA Conference 2017! Want a free expo pass? Go to https://www.rsaconference.com/events/us17/register and use the code: XE7PRMKEY On 2017-01-23 17:21, Francesco Sordi wrote: > Hi, > I know that version 6.5.2 of EJBCA can manage this attribute in DN of > certificates, but what about in publishing on LDAP an entry with a such > attribute in DN? > Which objectclass have I to add to LdapPublisher ? > > Best regards > > Francesco Sordi > > > ------------------------------------------------------------------------------ > Check out the vibrant tech community on one of the world's most > engaging tech sites, SlashDot.org! http://sdm.link/slashdot > > > > _______________________________________________ > Ejbca-news mailing list > Ejb...@li... > https://lists.sourceforge.net/lists/listinfo/ejbca-news > |
From: Francesco S. <f_s...@ya...> - 2017-01-23 16:21:24
|
Hi,I know that version 6.5.2 of EJBCA can manage this attribute in DN of certificates, but what about in publishing on LDAP an entry with a such attribute in DN?Which objectclass have I to add to LdapPublisher ? Best regards Francesco Sordi |
From: Tomas G. <to...@pr...> - 2016-07-07 06:58:18
|
Hi, I have added an updated cert-cvc library for download. Forgot about this one for a while, so it's a bit delayed. It is available for download at the download page [1]. Cert-cvc is a java development library for EU EAC ePassport and eID certificates, fully supporting EAC 2.10. The only news in this release is that it is updated to work with the latest release (1.54) of the BouncyCastle [2] crypto libs. [1]: https://www.ejbca.org/download.html [2]: https://www.bouncycastle.org/ Regards, The EJBCA Dev team |
From: Tomas G. <to...@pr...> - 2016-03-18 11:05:09
|
Sorry, this one was not supposed to go to ejbca-news, and can be ignored. Regards, Tomas On 2016-03-18 10:50, Ouassima CHAER NAJIB wrote: > Hi, > I started working on a pki ejbca project, it is verry important for me, > I installed ejbca in virtuel machine centos, I have chosen ejbca 6.3.1 > jboss 7 , after complete and successful installation, i cant access the > public page, but I cannot access the admin page of ejbca > (https://my@ip:8443/ejbca/adminweb), I am imported the certificat in the > browser without problem, I followed the guide in ejbca.org > <http://ejbca.org> > please someone can help me > > > ------------------------------------------------------------------------------ > Transform Data into Opportunity. > Accelerate data analysis in your applications with > Intel Data Analytics Acceleration Library. > Click to learn more. > http://pubads.g.doubleclick.net/gampad/clk?id=278785231&iu=/4140 > > > > _______________________________________________ > Ejbca-news mailing list > Ejb...@li... > https://lists.sourceforge.net/lists/listinfo/ejbca-news > |
From: Ouassima C. N. <o.c...@gm...> - 2016-03-18 09:51:07
|
Hi, I started working on a pki ejbca project, it is verry important for me, I installed ejbca in virtuel machine centos, I have chosen ejbca 6.3.1 jboss 7 , after complete and successful installation, i cant access the public page, but I cannot access the admin page of ejbca (https://my@ip:8443/ejbca/adminweb), I am imported the certificat in the browser without problem, I followed the guide in ejbca.org please someone can help me |
From: Markus K. <ma...@pr...> - 2015-11-16 15:58:02
|
Recently a vulnerability was documented by Foxglove Security [1] in regards to Java object deserialization. The basis of this vulnerability is that the Apache commons-collections library contains certain classes that can, due to a design flaw in how deserialization is performed, used to run remote code on a machine. While we don't use any of the offending classes from commons-collections in EJBCA or SignServer, merely the fact that they exist on the classpath presents a risk. The commons-collections library is also included in most application servers, including Oracle Weblogic [2] and JBoss. Existing support customers has been notified and patches provided. The next Community Edition releases will either contained patched versions of the library or a later version where the issue has been resolved. If you can't wait for those we recommend you follow Red Hat's recommendation [3] and remove the vulnerable classes your self. Note that both the commons-collections in the application server and in EJBCA/SignServer needs to be patched. [1] http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/ [2] http://www.oracle.com/technetwork/topics/security/alert-cve-2015-4852-2763333.html?elq_mid=31779&sh=&cmid=WWMK14064193MPP032C013 [3] https://access.redhat.com/solutions/2045023 Regards, The PrimeKey EJBCA and SignServer Teams PrimeKey will exhibit as partner together with Utimaco at Cartes, November 17-19, 2015. Take the opportunity to meet us in Paris @ Cartes Secure Connexions, Paris Nord, Villepinte, Hall 4, Booth 4 J 078. More information on the conference and exhibition is to be found at www.cartes.com. |
From: Tomas G. <to...@pr...> - 2015-10-20 08:59:08
|
The PrimeKey EJBCA team is happy to announce that ejbca.org is now available with HTTPS. This was made possible after the move of the web site to PrimeKey's infrastructure. A big thanks also to GlobalSign for providing EJBCA with a free TLS certificate for open source projects. Visit the site: https://www.ejbca.org Regards, PrimeKey EJBCA Team |
From: Tomas G. <to...@pr...> - 2014-08-11 09:16:53
|
Mainly a maintenance release EJBCA 6.2.1 addresses regressions that were spotted after the release of 6.2.0, as well as patching a possible XSS vulnerability in the public web interface. For more information see: http://www.primekey.se/Company/News/Product+news/Product+News+detail//EJBCA_Enterprise_6.2.1_-_Aug_2014.cid3364 Regards, PrimeKey EJBCA Team |
From: Tomas G. <to...@pr...> - 2014-04-07 08:55:10
|
Hi, We are happy to announce that EJBCA Community 6.1.1 has been released! This is a maintenance release with new features, bug fixes and improvements. In all 32 issues have been fixed. The biggest news in this release are support for EAC 2.10 access control templates (Enterprise only), more OCSP improvements as well as improvements for Key Recovery. * Noteworthy changes: - OCSP improvements and new features related to RFC 6960, minimizing size of OCSP responses (see note below). - Implemented OCSP signing algorithm selecttion including client requested algorithms. - CVC certificate profiles (ePassport PKI) now supports EAC 2.10 access control templates (Enterprise only) - Improvements to Key Recovery enabling encryption key rollover and providing more information about encryption keys. - Windows build/install is now working. - ManagementCA created during a default install now uses SHA256WithRSA. - EJBCA now compiles (deployment/running not supported however) on WildFly 8 and Glasshish 4, also using Java 8. - EJBCA can now use certificate serial number longer than 64 bits. - Minor improvements and fixes to make life easier for everyone. Note 1: OCSP responses no longer includes the Root CA Certificate, unless the Root CA is the OCSP signer, and it is configured to include the signer certificate. Having OCSP responses as small as possible is an important performance feature, and since the client must have the root certificate as trusted there is no need to include the root certificate in the chain. Note 2: In EJBCA 6.1.0 the Public Web interface logo filename was changed. If you have customized your own logo, you need to rename the logo filename from 'logotype.png' or 'ejbca_pki_by_primekey_logo.png' to 'banner_ejbca-public.png'. Read the full Changelog for details. For upgrade instructions, please see UPGRADE. - Known issues: * One test failure on DB2: https://jira.primekey.se/browse/ECA-3298 * OCSP request signer verification does an additional database lookup: https://jira.primekey.se/browse/ECA-3299 * Poorly created primary keys for the AdminEntityData table causes issues in some cases: https://jira.primekey.se/browse/ECA-3469 Regards, The PrimeKey EJBCA Team |
From: Tomas G. <to...@pr...> - 2014-03-24 16:11:43
|
The PrimeKey EJBCA team is happy to announce the release of EJBCA Enterprise 6.1.0. Community will follow. This release resolves several issues, with a few highlights: Increased performance through OCSP improvements; Key Recovery improvements; support for EAC 2.10 (ePassport) access control templates. Running on the latest technology platforms, EJBCA Enterprise v.6 is so flexible it is suitable for any organization, cloud, social or mobile system. Faster, more resource efficient, more secure and more user friendly than ever. EJBCA Enterprise *6.1.0* release notes A maintenance release containing 32 new features and improvements, below a selection of the most noteworthy: * New features - New OCSP features related to RFC 6960, minimizing size of OCSP responses. - Implemented OCSP signing algorithm selection from client requested algorithms. - CVC certificate profiles (ePassport PKI) now supports EAC 2.10 access control templates. (Enterprise only) * Improvements - OCSP improvements with more cache control settings. - Improvements to Key Recovery, enabling encryption key rollover and providing more information about encryption keys. - Ability to build and install EJBCA on Windows platforms. - The ManagementCA created during default install, now uses SHA256WithRSA. - EJBCA compiles cleanly with Java 8, WildFly 8 and Glassfish 4 (running on those platforms however, is not yet supported). - EJBCA can now use certificate serial number longer than 64 bits. - Many reported minor issues have been fixed, as well as minor GUI improvements. Regards, PrimeKey EJBCA Team ********** PrimeKey Solutions AB Internet: www.primekey.se Twitter: twitter.com/primekeyPKI ********** |