Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Tuf - A Framework For Securing Software Update Systems

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Tuf - A Framework For Securing Software Update Systems


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


This repository is the reference implementation of The Update Framework (TUF). It is written in Python and intended to conform to version 1.0 of the TUF specification. This implementation is in use in production systems, but is also intended to be a readable guide and demonstration for those working on implementing TUF in their own languages, environments, or update systems.


About The Update Framework

The Update Framework (TUF) design helps developers maintain the security of a software update system, even against attackers that compromise the repository or signing keys. TUF provides a flexible specification defining functionality that developers can use in any software update system or re-implement to fit their needs.

TUF is hosted by the Linux Foundation as part of the Cloud Native Computing Foundation (CNCF) and its design is used in production by various tech companies and open source organizations. A variant of TUF called Uptane is used to secure over-the-air updates in automobiles.

Please see the TUF Introduction and TUF's website for more information about TUF!


Documentation

Contact

Please contact us via our mailing list. Questions, feedback, and suggestions are welcomed on this low volume mailing list.

We strive to make the specification easy to implement, so if you come across any inconsistencies or experience any difficulty, do let us know by sending an email, or by reporting an issue in the GitHub specification repo.


Security Issues and Bugs

Security issues can be reported by emailing jcappos@nyu.edu.

At a minimum, the report must contain the following:

  • Description of the vulnerability.
  • Steps to reproduce the issue.

Optionally, reports that are emailed can be encrypted with PGP. You should use PGP key fingerprint E9C0 59EC 0D32 64FA B35F 94AD 465B F9F6 F8EB 475A.

Please do not use the GitHub issue tracker to submit vulnerability reports. The issue tracker is intended for bug reports and to make feature requests. Major feature requests, such as design changes to the specification, should be proposed via a TUF Augmentation Proposal (TAP).


Limitations

The reference implementation may behave unexpectedly when concurrently downloading the same target files with the same TUF client.


License

This work is dual-licensed and distributed under the (1) MIT License and (2) Apache License, Version 2.0. Please see LICENSE-MIT and LICENSE.


Acknowledgements

This project is hosted by the Linux Foundation under the Cloud Native Computing Foundation. TUF's early development was managed by members of the Secure Systems Lab at New York University. We appreciate the efforts of Konstantin Andrianov, Geremy Condra, Vladimir Diaz, Yuyu Zheng, Sebastien Awwad, Santiago Torres-Arias, Trishank Kuppusamy, Zane Fisher, Pankhuri Goyal, Tian Tian, Konstantin Andrianov, and Justin Samuel who are among those who helped significantly with TUF's reference implementation. Contributors and maintainers are governed by the CNCF Community Code of Conduct.

This material is based upon work supported by the National Science Foundation under Grant Nos. CNS-1345049 and CNS-0959138. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.



...



๐Ÿ“Œ Tuf - A Framework For Securing Software Update Systems


๐Ÿ“ˆ 49.85 Punkte

๐Ÿ“Œ Asus TUF B350M-Plus Gaming: Erstes TUF-Mainboard fรผr AMD Ryzen trรคgt B350-Chipsatz


๐Ÿ“ˆ 35.49 Punkte

๐Ÿ“Œ Update-Framework TUF nun offizielles Projekt der CNCF


๐Ÿ“ˆ 27.39 Punkte

๐Ÿ“Œ When it comes to technology, securing your future means securing your present


๐Ÿ“ˆ 22.64 Punkte

๐Ÿ“Œ Daily deals Feb. 1: H&R Block Tax Software Deluxe $23, 1 year of Microsoft 365 for $45, $300 off Asus Tuf gaming laptop


๐Ÿ“ˆ 22.08 Punkte

๐Ÿ“Œ CVE-2022-43484 | TERASOLUNA Global Framework/Server Framework Spring Framework input validation


๐Ÿ“ˆ 21.37 Punkte

๐Ÿ“Œ What is the NIST Secure Software Software Development Framework and Why Should We (as a Software Vendor) Care?


๐Ÿ“ˆ 20.13 Punkte

๐Ÿ“Œ Microsoft publishes SECCON framework for securing Windows 10


๐Ÿ“ˆ 18.45 Punkte

๐Ÿ“Œ Securing SAP Systems, Your Companyโ€™s โ€˜Tree of Soulsโ€™


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ Architectures for Securing IT Systems


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ IBM launches open-source library for securing AI systems


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ Securing IT systems in the hybrid workplace with identity governance


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ Securing Access, Hardening Configurations, and Monitoring for Change on ICS Systems


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ The Living Dead: Securing Legacy Industrial Systems


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ 3 Simple Steps to Securing Your ICS Systems against Digital Threats


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ NIST SP 1800-23, Energy Sector Asset Management: Securing Industrial Control Systems


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ Securing the World's Energy Systems: Where Physical Security and Cybersecurity Must Meet


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ Checklist: Securing Windows 10 Systems


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ US Government Issues Guidance on Securing Water Systems


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ Microsoft Publishes Guide to Securing Systems Vulnerable to Zerologon Attacks


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ Misplaced expectations securing water treatment systems


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ What Is NIST SP 1800-27: Securing Property Management Systems?


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ NSA Releases Guidance for Securing Enterprise Communication Systems


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ Adding visibility to the invisible: securing your automated systems


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ What the food and building industry can teach us about securing embedded systems


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ Fortifying IoT Devices: Unraveling the Art of Securing Embedded Systems


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ Securing AI systems against evasion, poisoning, and abuse


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ CISA, EPA, and FBI Release Top Cyber Actions for Securing Water Systems


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ Securing Virtual Memory in Operating Systems


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ CISA And FBI Share Cyber Attack Defenses For Securing Water Systems


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ Updated: Top Cyber Actions for Securing Water Systems


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ The Art of Ethical Hacking: Securing Systems in the Digital Age


๐Ÿ“ˆ 18.13 Punkte

๐Ÿ“Œ AM3+-Mainboard: Asus TUF Sabertooth 990FX R3.0 mit NVMe und USB 3.1


๐Ÿ“ˆ 17.74 Punkte











matomo