Kyle Hamilton is right. The authoritative document is the NSS module's security
policy, which is linked from their validation certificate (see above). That
policy specifies how the module can be used in order to be FIPS 140-2 compliant.
According to the NIST FIPS 140-2 Implementation Guide
(htt
Dear forum readers,
I use self-signed certificates. As long as it's not for a large public, trust
can be achieved that way : the certificate is sent to a friend, its fingerprint
is then verified via a secure (enough) channel such as a phone call, and that's
fine.
Hence I was sure this wouln't
Dear forum readers,
I use self-signed certificates. As long as it's not for a large public, trust
can be achieved that way : the certificate is sent to a friend, its fingerprint
is then verified via a secure (enough) channel such as a phone call, and that's
fine.
Hence I was sure this wouln't
Dear forum readers,
I use self-signed certificates. As long as it's not for a large public, trust
can be achieved that way : the certificate is sent to a friend, its fingerprint
is then verified via a secure (enough) channel such as a phone call, and that's
fine.
Hence I was sure this wouln't
4 matches
Mail list logo